aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorglarkin <glarkin@FreeBSD.org>2010-04-07 01:53:39 +0800
committerglarkin <glarkin@FreeBSD.org>2010-04-07 01:53:39 +0800
commit8de040e9e97db818ac450827fb4f01de040a2bfb (patch)
tree0f7c05f12c77e684619cad567ae58da6aa8811a3
parentbbe8be12aa8369bfd067f9ab40fef1d3cf2c5510 (diff)
downloadfreebsd-ports-gnome-8de040e9e97db818ac450827fb4f01de040a2bfb.tar.gz
freebsd-ports-gnome-8de040e9e97db818ac450827fb4f01de040a2bfb.tar.zst
freebsd-ports-gnome-8de040e9e97db818ac450827fb4f01de040a2bfb.zip
- Document dojo - cross-site scripting and other vulnerabilities
- Document ZendFramework - security issues in bundled Dojo library Approved by: secteam (remko) Security: http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/ Security: http://framework.zend.com/security/advisory/ZF2010-07
-rw-r--r--security/vuxml/vuln.xml72
1 files changed, 72 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 5c7cdb103e76..6103b09a946a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,78 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="805603a1-3e7a-11df-a5a1-0050568452ac">
+ <topic>dojo -- cross-site scripting and other vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>dojo</name>
+ <range><lt>1.4.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Dojo Toolkit team reports:</p>
+ <blockquote cite="http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/">
+ <p>Some PHP files did not properly escape input.</p>
+ <p>Some files could operate like "open redirects". A bad actor
+ could form an URL that looks like it came from a trusted
+ site, but the user would be redirected or load content from
+ the bad actor's site.</p>
+ <p>A file exposed a more serious cross-site scripting
+ vulnerability with the possibility of executing code on the
+ domain where the file exists.</p>
+ <p>The Dojo build process defaulted to copying over tests and
+ demos, which are normally not needed and just increased the
+ number of files that could be targets of attacks.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/</url>
+ <url>http://osdir.com/ml/bugtraq.security/2010-03/msg00133.html</url>
+ <url>http://packetstormsecurity.org/1003-exploits/dojo-xss.txt</url>
+ <url>http://secunia.com/advisories/38964</url>
+ <url>http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/</url>
+ </references>
+ <dates>
+ <discovery>2010-03-11</discovery>
+ <entry>2010-04-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="8ad1c404-3e78-11df-a5a1-0050568452ac">
+ <topic>Zend Framework -- security issues in bundled Dojo library</topic>
+ <affects>
+ <package>
+ <name>ZendFramework</name>
+ <range><lt>1.10.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Zend Framework team reports:</p>
+ <blockquote cite="http://framework.zend.com/security/advisory/ZF2010-07">
+ <p>Several files in the bundled Dojo library were identified
+ as having potential exploits, and the Dojo team also advised
+ disabling or removing any PHP scripts in the Dojo library tree
+ when deploying to production.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/</url>
+ <url>http://framework.zend.com/security/advisory/ZF2010-07</url>
+ <url>http://osdir.com/ml/bugtraq.security/2010-03/msg00133.html</url>
+ <url>http://packetstormsecurity.org/1003-exploits/dojo-xss.txt</url>
+ <url>http://secunia.com/advisories/38964</url>
+ <url>http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/</url>
+ </references>
+ <dates>
+ <discovery>2010-04-01</discovery>
+ <entry>2010-04-06</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ec8f449f-40ed-11df-9edc-000f20797ede">
<topic>firefox -- Re-use of freed object due to scope confusion</topic>
<affects>