aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2008-12-20 04:59:59 +0800
committermiwi <miwi@FreeBSD.org>2008-12-20 04:59:59 +0800
commita9896e3669113734fd8e8a2a53bf49f2211fd8ed (patch)
tree1d4b0e786a7dace918305aecacee08241a1b63e3
parent5cf3eedd0920dfe5ed64c51e32ab42d58aba1bc1 (diff)
downloadfreebsd-ports-gnome-a9896e3669113734fd8e8a2a53bf49f2211fd8ed.tar.gz
freebsd-ports-gnome-a9896e3669113734fd8e8a2a53bf49f2211fd8ed.tar.zst
freebsd-ports-gnome-a9896e3669113734fd8e8a2a53bf49f2211fd8ed.zip
- Document mediawiki -- multiple vulnerabilities
-rw-r--r--security/vuxml/vuln.xml51
1 files changed, 51 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 612ab0bc953a..6d847f3e05d9 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,57 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="61b07d71-ce0e-11dd-a721-0030843d3802">
+ <topic>mediawiki -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mediawiki</name>
+ <range><gt>1.6.0</gt><lt>1.6.11</lt></range>
+ <range><gt>1.12.0</gt><lt>1.12.3</lt></range>
+ <range><gt>1.13.0</gt><lt>1.13.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The MediaWiki development team reports:</p>
+ <blockquote
+ cite="http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html">
+ <p>Certain unspecified input is not properly sanitised before being
+ returned to the user. This can be exploited to execute arbitrary HTML
+ and script code in a user's browser session in context of an affected
+ site.</p>
+ <p>Certain unspecified input related to uploads is not properly
+ sanitised before being used. This can be exploited to inject arbitrary
+ HTML and script code, which will be executed in a user's browser
+ session in context of an affected site when a malicious data is
+ opened. Successful exploitation may require that uploads are enabled
+ and the victim uses an Internet Explorer based browser.</p>
+ <p>Certain SVG scripts are not properly sanitised before being used.
+ This can be exploited to inject arbitrary HTML and script code, which
+ will be executed in a user's browser session in context of an affected
+ site when a malicious data is opened. Successful exploitation may require
+ that SVG uploads are enabled and the victim uses a browser supporting SVG
+ scripting.</p>
+ <p>The application allows users to perform certain actions via HTTP
+ requests without performing any validity checks to verify the
+ requests. This can be exploited to perform certain operations when a
+ logged in user visits a malicious site.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2008-5249</cvename>
+ <cvename>CVE-2008-5250</cvename>
+ <cvename>CVE-2008-5252</cvename>
+ <url>http://secunia.com/advisories/33133/</url>
+ <url>http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html</url>
+ </references>
+ <dates>
+ <discovery>2008-12-15</discovery>
+ <entry>2008-12-19</entry>
+ </dates>
+ </vuln>
+
<vuln vid="609c790e-ce0a-11dd-a721-0030843d3802">
<topic>drupal -- multiple vulnerabilities</topic>
<affects>