blob: 6b79d2f81514d9b502715b9f5deef82b79ad167a [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200501-08">
<title>phpGroupWare: Various vulnerabilities</title>
Multiple vulnerabilities have been discovered in phpGroupWare that could
lead to information disclosure or remote compromise.
<product type="ebuild">phpgroupware</product>
<announced>January 06, 2005</announced>
<revised>May 22, 2006: 04</revised>
<package name="www-apps/phpgroupware" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
phpGroupWare is a web-based suite of group applications including a
calendar, todo-list, addressbook, email, wiki, news headlines, and a
file manager.
Several flaws were discovered in phpGroupWare making it vulnerable to
cross-site scripting attacks, SQL injection, and full path disclosure.
<impact type="normal">
These vulnerabilities could allow an attacker to perform cross-site
scripting attacks, execute SQL queries, and disclose the full path of
the web directory.
There is no known workaround at this time.
All phpGroupWare users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpgroupware-;</code>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
<uri link="">BugTraq Advisory</uri>
<uri link="">CVE-2004-1383</uri>
<uri link="">CVE-2004-1384</uri>
<uri link="">CVE-2004-1385</uri>
<metadata tag="requester" timestamp="Thu, 6 Jan 2005 08:52:11 +0000">
<metadata tag="bugReady" timestamp="Thu, 6 Jan 2005 08:52:20 +0000">
<metadata tag="submitter" timestamp="Thu, 6 Jan 2005 13:44:43 +0000">