Bug 493116 (CVE-2009-1175)

Summary: CVE-2009-1175 banshee: XSS flaw in the DAAP extension
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED RAWHIDE QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: gnomeuser, michel, tcallawa, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-12-04 18:47:51 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Tomas Hoger 2009-03-31 17:14:30 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-1175 to the following vulnerability:

Cross-site scripting (XSS) vulnerability in apps/web/vs_diag.cgi in
the DAAP extension in Banshee 1.4.2 allows remote attackers to inject
arbitrary web script or HTML via the server parameter, which is not
properly handled in an error message. 

Upstream bug report:
http://bugzilla.gnome.org/show_bug.cgi?id=577270

Comment 1 Vincent Danen 2009-12-04 18:47:51 UTC
This was corrected upstream in 1.4.4 and 1.5.0; Fedora 10 contains 1.4.2 so is vulnerable, but Fedora 11 and 12 both contain 1.5.1 so are fixed.  Considering the Fedora 10 EOL is fast approaching and this is a low severity issue, closing the bug.