drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in Deluge
Name: |
Cross-Site Scripting in Deluge |
|
ID: |
202210-07 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
So, 16. Oktober 2022, 20:08 |
|
Referenzen: |
https://nvd.nist.gov/vuln/detail/CVE-2021-3427 |
|
Applikationen: |
Deluge |
|
Originalnachricht |
--===============6113509899309573572== Content-Type: text/plain; charset="utf-8"
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202210-07 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Low Title: Deluge: Cross-Site Scripting Date: October 16, 2022 Bugs: #866842 ID: 202210-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis ========
A vulnerability has been found in Deluge which could result in XSS.
Background ==========
Deluge is a BitTorrent client.
Affected packages =================
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-p2p/deluge < 2.1.1 >= 2.1.1
Description ===========
Deluge does not sufficiently sanitize crafted torrent file data, leading to the application interpreting untrusted data as HTML.
Impact ======
An attacker can achieve XSS via a crafted torrent file.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
All Deluge users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-p2p/deluge-2.1.1"
References ==========
[ 1 ] CVE-2021-3427 https://nvd.nist.gov/vuln/detail/CVE-2021-3427
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202210-07
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License =======
Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 --===============6113509899309573572== Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmNMGFkACgkQFMQkOaVy +9lqJg//RwweLw7g2n6SUA/gbkWdaTg/PBLXgkU18TiBdBr7spaxCn9j7Ch1GCPa DVVzVrnPJyTK7/ui+LprdoVBS1Uz29VRYEZXUjsMWY161WEG8jZ/DvcLXUimlGH1 dEvA9ynnajCz9tUiZszCl13/mkPJOneMOoj2czHNj4c0dK7HQAGGWQiQVzfeD8mU zIUoP4Oq14S4MmRHPdZiZCht6wrC68dQqunjCkwro4P8CTmkxOSx9rPOxQ2P8BFh WapckKtf+OPZo3hY5kIqGCo2+DMzQP7qbumi1mvviS0CdwhLp+CP4QHFod2Vnn21 BrQLzGv2ogOO4flmEfhx7nGhqutCzmT/DjzLykkoBvnoeh8DvDN0p4mE22xnBJOu fVhDYRm5JxNTtoTC4rA4bYherMkmUU6JoJ4fkwiaIyr5tSqeDf/wMXslNwV8c3G0 4SKEkE1lLvlDRT94Je0XaL4hvTMH+8ZnLK/O4Llcvj1vHGoI+SmlGHc2eOKBU+GJ l+SRI3Vj589X9joNuxob+eb8CBZcTGrhuWUOxEsM6hxap7NPYJcYdlSQFl9QAMkP 5u2HokpPiFeLSzk9x5FWkdFPIcLNGL9Gn08gcd+KCbjMgZ7UoJUPKbsArOuy8fB/ oDSM840kqFRZQ4nXOw++pd//dercDY5mHO0tvBrnfhze86bgqgU= =8t3P -----END PGP SIGNATURE-----
--===============6113509899309573572==--
|
|
|
|