A cross-site scripting (XSS) flaw was found in the way 'langwiz' example script of GeSHi, a generic syntax highlighter, performed sanitization of certain HTTP GET / POST request variables (prior dumping their content). A remote attacker could provide a specially-crafted URL that, when visited would lead to arbitrary HTML or web script execution.
Relevant upstream patch (according to clarification by Raphael Geissert in
This issue affects the versions of the php-geshi package, as shipped with Fedora release of 16 and 17. Please schedule an update.
This issue did NOT affect the versions of the php-geshi package, as shipped with Fedora EPEL 5 and EPEL 6 (as they did not include the vulnerable langwiz.php example script yet).
Created php-geshi tracking bugs for this issue
Affects: fedora-all [bug 850435]
The CVE identifier of CVE-2012-3522 has been assigned to this issue:
php-geshi-126.96.36.199-3.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
php-geshi-188.8.131.52-3.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.