MGASA-2013-0183

Source
https://advisories.mageia.org/MGASA-2013-0183.html
Import Source
https://advisories.mageia.org/MGASA-2013-0183.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0183
Related
Published
2013-06-26T18:11:16Z
Modified
2013-06-26T18:11:13Z
Summary
Updated perl-Dancer package fixes CVE-2012-5572
Details

A security flaw was found in the way Dancer.pm, lightweight yet powerful web application framework / Perl language module, performed sanitization of values to be used for cookie() and cookies() methods. A remote attacker could use this flaw to inject arbitrary headers into responses from (Perl) applications, that use Dancer.pm (CVE-2012-5572).

References
Credits

Affected packages

Mageia:2 / perl-Dancer

Package

Name
perl-Dancer
Purl
pkg:rpm/mageia/perl-Dancer?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.311.500-1.mga2

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / perl-Dancer

Package

Name
perl-Dancer
Purl
pkg:rpm/mageia/perl-Dancer?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.311.500-1.mga3

Ecosystem specific

{
    "section": "core"
}