-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4165-1 security@debian.org https://www.debian.org/security/ Luciano Bello April 03, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ldap-account-manager CVE ID : CVE-2018-8763 CVE-2018-8764 Michal Kedzior found two vulnerabilities in LDAP Account Manager, a web front-end for LDAP directories. CVE-2018-8763 The found Reflected Cross Site Scripting (XSS) vulnerability might allow an attacker to execute JavaScript code in the browser of the victim or to redirect her to a malicious website if the victim clicks on a specially crafted link. CVE-2018-8764 The application leaks the CSRF token in the URL, which can be use by an attacker to perform a Cross-Site Request Forgery attack, in which a victim logged in LDAP Account Manager might performed unwanted actions in the front-end by clicking on a link crafted by the attacker. For the oldstable distribution (jessie), these problems have been fixed in version 4.7.1-1+deb8u1. For the stable distribution (stretch), these problems have been fixed in version 5.5-1+deb9u1. We recommend that you upgrade your ldap-account-manager packages. For the detailed security status of ldap-account-manager please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ldap-account-manager Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEayzFlnvRveqeWJspbsLe9o/+N3QFAlrEKtAACgkQbsLe9o/+ N3SLAg/8D57LdCvy6gnki27pdVsXd0WwHd18CD0/LMKX+1WicjxYbV6FXmQ/7iON Vsbwr0dSYBlszFnRYcgP6wRxabjRnfgEUcp2z7DOeN2/OFyp50Ct9AHJsQUkurvK m1UCPtpp0ij0APnaGWQc9sb4oJcBhIAu8pzvCiGbV5RywYWIqV70ok9DawOqecWJ eAMKBwEwmsn4gOId1vmDeK33kBRceWm0DCkdehzmvp6VzP4K3K+7KYs59pEuvpJO UQtItfs+a+L7ob2iWtDEwxaXFK/3kptEXLjEbdobonFCL2GnXDTozWvGpMuCrO/g fEnU9Bbwg1n3BqzpWPFw+8gDwkvJZ+EoIGQwPEcaE0khmokdMOssmrpIlFZucomQ CtHA74kctZAc6xOeGIF6VS6uElScyyYTak/IzETuDjapbw9bVjIPxj/vbaQNWIoi bOm5Nf4nprKM1a0UMLmIzalFIEL6gZCsTc0kVC9AKtYb79wYP3ZJKcDLWOlRPpXf 29nh4WaE+uCU9wnjjIDorv9M63eDcBW6oOWpoaLis7Iv14GYeTk8PDBMP9+RQ8gk sJ98Xv3gmd90ZC/5UX3vJ7FikFiDX8pK3xKEwfLfv1lXsN15KX/OgCxUbruAm5VG TUyDOe+JTs+KCIVbCq9bxHCLsAvroGwwUHCW0HtBThDmOiUIChc= =GGc+ -----END PGP SIGNATURE-----