diff options
author | delphij <delphij@FreeBSD.org> | 2013-05-26 16:38:26 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2013-05-26 16:38:26 +0800 |
commit | 1d59257624a252cefb2d90e1acabca52e6adb304 (patch) | |
tree | a0a8994a36ec0c3b8ef872d7bcf3f8709a6dfdcb | |
parent | 908c8a65cd819b98759428d94b7fb4c7b1d3b18f (diff) | |
download | freebsd-ports-gnome-1d59257624a252cefb2d90e1acabca52e6adb304.tar.gz freebsd-ports-gnome-1d59257624a252cefb2d90e1acabca52e6adb304.tar.zst freebsd-ports-gnome-1d59257624a252cefb2d90e1acabca52e6adb304.zip |
Document couchdb XSS vulnerability.
PR: ports/178985
Submitted by: wollman
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 385decba34b5..8e0c8f41591d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,35 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="4fb45a1c-c5d0-11e2-8400-001b216147b0"> + <topic>couchdb -- DOM based Cross-Site Scripting via Futon UI</topic> + <affects> + <package> + <name>couchdb</name> + <range><lt>1.2.1,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Jan Lehnardt reports:</p> + <blockquote cite="http://mail-archives.apache.org/mod_mbox/couchdb-user/201301.mbox/%3C2FFF2FD7-8EAF-4EBF-AFDA-5AEB6EAC853F@apache.org%3E"> + <p>Query parameters passed into the browser-based test suite + are not sanitised, and can be used to load external resources. + An attacker may execute JavaScript code in the browser, using + the context of the remote user.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-5650</cvename> + <url>http://mail-archives.apache.org/mod_mbox/couchdb-user/201301.mbox/%3C2FFF2FD7-8EAF-4EBF-AFDA-5AEB6EAC853F@apache.org%3E</url> + </references> + <dates> + <discovery>2012-01-14</discovery> + <entry>2013-05-26</entry> + </dates> + </vuln> + <vuln vid="a5b24a6b-c37c-11e2-addb-60a44c524f57"> <topic>otrs -- information disclosure</topic> <affects> |