CVE-2016-1566

NameCVE-2016-1566
DescriptionCross-site scripting (XSS) vulnerability in the file browser in Guacamole 0.9.8 and 0.9.9, when file transfer is enabled to a location shared by multiple users, allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename. NOTE: this vulnerability was fixed in guacamole.war on 2016-01-13, but the version number was not changed.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
guacamole-client (PTS)jessie0.8.3-1.1fixed
stretch0.9.9+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
guacamolesource(unstable)(not affected)
guacamole-clientsource(unstable)(not affected)

Notes

- guacamole-client <not-affected> (Vulnerable code never present in released Debian version, cf #859136)
- guacamole <not-affected> (Vulnerable code not present)
Fixed by: https://github.com/glyptodon/guacamole-client/commit/7da13129c432d1c0a577342a9bf23ca2bde9c367
The Debian released versions never contained the broken code in guacFileBrowser.js
in a released version.

Search for package or bug name: Reporting problems