Debian DLA-298-1 : roundup security update

medium Nessus Plugin ID 85586

Synopsis

The remote Debian host is missing a security update.

Description

- CVE-2012-6130 Cross-site scripting (XSS) vulnerability in the history display in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via a username, related to generating a link.

- CVE-2012-6131 Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the @action parameter to support/issue1.

- CVE-2012-6132 Cross-site scripting (XSS) vulnerability in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the otk parameter.

- CVE-2012-6133 XSS flaws in ok and error messages We solve this differently from the proposals in the bug-report by not allowing *any* html-tags in ok/error messages anymore.

NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Upgrade the affected roundup package.

See Also

https://lists.debian.org/debian-lts-announce/2015/08/msg00012.html

https://packages.debian.org/source/squeeze-lts/roundup

Plugin Details

Severity: Medium

ID: 85586

File Name: debian_DLA-298.nasl

Version: 2.5

Type: local

Agent: unix

Published: 8/24/2015

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:6.0, p-cpe:/a:debian:debian_linux:roundup

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/23/2015

Vulnerability Publication Date: 4/10/2014

Reference Information

CVE: CVE-2012-6130, CVE-2012-6131, CVE-2012-6132, CVE-2012-6133

BID: 56480