Dig Config Parameter Cross-Site Scripting Vulnerability

BID:12442

Info

Dig Config Parameter Cross-Site Scripting Vulnerability

Bugtraq ID: 12442
Class: Input Validation Error
CVE: CVE-2005-0085
Remote: Yes
Local: No
Published: Feb 03 2005 12:00AM
Updated: Jul 31 2006 10:21PM
Credit: This issue was reported by SuSE.
Vulnerable: The ht://Dig Group ht://Dig 3.2 0b6
The ht://Dig Group ht://Dig 3.2 0b5
The ht://Dig Group ht://Dig 3.2 0b4
- Debian Linux 2.1
- Debian Linux 2.0
- HP HP-UX 10.20
- HP HP-UX 9.10
- Sun Solaris 2.6
- Sun Solaris 2.5
- Sun SunOS 4.1.4
The ht://Dig Group ht://Dig 3.2 0b3
- Debian Linux 2.1
- Debian Linux 2.0
- HP HP-UX 10.20
- HP HP-UX 9.10
+ HP Secure OS software for Linux 1.0
+ Redhat Linux 7.2
+ Redhat Linux 7.1
- Sun Solaris 2.6
- Sun Solaris 2.5
- Sun SunOS 4.1.4
The ht://Dig Group ht://Dig 3.2 0b2
- Debian Linux 2.1
- Debian Linux 2.0
- HP HP-UX 10.20
- HP HP-UX 9.10
- Sun Solaris 2.6
- Sun Solaris 2.5
- Sun SunOS 4.1.4
The ht://Dig Group ht://Dig 3.2 .0
+ Mandriva Linux Mandrake 8.1
The ht://Dig Group ht://Dig 3.1.6
+ Debian Linux 3.0
- Debian Linux 2.1
- Debian Linux 2.0
+ Gentoo Linux
- HP HP-UX 10.20
- HP HP-UX 9.10
- Sun Solaris 2.6
- Sun Solaris 2.5
- Sun SunOS 4.1.4
The ht://Dig Group ht://Dig 3.1.5 -8
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1
The ht://Dig Group ht://Dig 3.1.5 -7
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1
The ht://Dig Group ht://Dig 3.1.5
+ Debian Linux 2.2 sparc
+ Debian Linux 2.2 powerpc
+ Debian Linux 2.2 arm
+ Debian Linux 2.2 alpha
+ Debian Linux 2.2 68k
+ Debian Linux 2.2
- Debian Linux 2.1
- Debian Linux 2.0
- HP HP-UX 10.20
- HP HP-UX 9.10
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
+ Mandriva Linux Mandrake 7.2
- Sun Solaris 2.6
- Sun Solaris 2.5
- Sun SunOS 4.1.4
SuSE Linux 8.1
SuSE Linux 8.0 i386
SuSE Linux 8.0
SCO Unixware 7.1.4
SCO Unixware 7.1.3 up
SCO Unixware 7.1.3
SCO Open Server 6.0
SCO Open Server 5.0.7
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
Redhat Linux 9.0 i386
Redhat Linux 7.3 i686
Redhat Linux 7.3 i386
Redhat Linux 7.3
Redhat Fedora Core3
Redhat Fedora Core2
Redhat Fedora Core1
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
Mandriva Linux Mandrake 10.0 AMD64
Mandriva Linux Mandrake 10.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
MandrakeSoft Corporate Server 2.1 x86_64
MandrakeSoft Corporate Server 2.1
Not Vulnerable:

Discussion

Dig Config Parameter Cross-Site Scripting Vulnerability

ht://Dig is reported prone to a cross-site scripting vulnerability. This issue is due to the application's failure to properly sanitize user-supplied URI data before including it in dynamically generated web-page content.

All versions of ht://Dig are considered vulnerable at the moment.

Exploit / POC

Dig Config Parameter Cross-Site Scripting Vulnerability

An exploit is not required.

Solution / Fix

Dig Config Parameter Cross-Site Scripting Vulnerability

Solution:
SuSE Linux has released a security summary report (SUSE-SR:2005:003) that contains fixes to address this and other vulnerabilities. Please see the referenced advisories for more information on obtaining and applying appropriate updates.


The ht://Dig Group ht://Dig 3.1.6

The ht://Dig Group ht://Dig 3.2 .0

The ht://Dig Group ht://Dig 3.2 0b6

SCO Open Server 5.0.7

SCO Open Server 6.0

SCO Unixware 7.1.3

SCO Unixware 7.1.3 up

SCO Unixware 7.1.4

References

Dig Config Parameter Cross-Site Scripting Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report