Summary
The remote host is missing an update to sork-passwd-h3 announced via advisory DSA 1829-2.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201829-2
Insight
The previous update introduced a regression in main.php, causing the module to fail. This update corrects the flaw. . For reference the original advisory text is below.
It was discovered that sork-passwd-h3, a Horde3 module for users to change their password, is prone to a cross-site scripting attack via the backend parameter.
For the oldstable distribution (etch), this problem has been fixed in version 3.0-2+etch2.
For the stable distribution (lenny), this problem has been fixed in version 3.0-2+lenny2.
For the testing distribution (squeeze), this problem will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in version 3.1-1.2.
We recommend that you upgrade your sork-passwd-h3 packages.
Severity
Classification
-
CVE CVE-2009-2360 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities