Bug#859136: CVE-2016-1566: XSS vulnerability in file browser

Antoine Beaupre anarcat at orangeseeds.org
Thu Mar 30 18:45:21 UTC 2017


Package: guacamole-client
X-Debbugs-CC: team at security.debian.org secure-testing-team at lists.alioth.debian.org
Severity: normal
Tags: security
Version: 0.9.9+dfsg-1

Hi,

the following vulnerability was published for guacamole.

CVE-2016-1566[0]:
| Cross-site scripting (XSS) vulnerability in the file browser in
| Guacamole 0.9.8 and 0.9.9, when file transfer is enabled to a location
| shared by multiple users, allows remote authenticated users to inject
| arbitrary web script or HTML via a crafted filename.  NOTE: this
| vulnerability was fixed in guacamole.war on 2016-01-13, but the
| version number was not changed.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-1566
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1566
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-remote-team/attachments/20170330/62f5ccd5/attachment.sig>


More information about the pkg-remote-team mailing list