diff options
author | koobs <koobs@FreeBSD.org> | 2019-04-26 19:29:16 +0800 |
---|---|---|
committer | koobs <koobs@FreeBSD.org> | 2019-04-26 19:29:16 +0800 |
commit | 8e10a866838673dd880fbc751546d32d307a512a (patch) | |
tree | f18c19e5604d374e48c312c8bda754fb91203e42 | |
parent | 461f20bb9b27e7f6a19845bac444d0ba2ddd5d69 (diff) | |
download | freebsd-ports-gnome-8e10a866838673dd880fbc751546d32d307a512a.tar.gz freebsd-ports-gnome-8e10a866838673dd880fbc751546d32d307a512a.tar.zst freebsd-ports-gnome-8e10a866838673dd880fbc751546d32d307a512a.zip |
security/vuxml: Add buildbot CRLF injection vulnerability
-rw-r--r-- | security/vuxml/vuln.xml | 43 |
1 files changed, 43 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 11f34af1039b..6ab15e0773ac 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,49 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="5536ea5f-6814-11e9-a8f7-0050562a4d7b"> + <topic>buildbot -- CRLF injection in Buildbot login and logout redirect code</topic> + <affects> + <package> + <name>py27-buildbot</name> + <name>py35-buildbot</name> + <name>py36-buildbot</name> + <name>py37-buildbot</name> + <range><lt>1.8.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <blockquote cite="https://github.com/buildbot/buildbot/wiki/CRLF-injection-in-Buildbot-login-and-logout-redirect-code"> + <p>A CRLF can be injected in Location header of /auth/login and /auth/logout + This is due to lack of input validation in the buildbot redirection code. + </p> + <p>It was not found a way to impact Buildbot product own security through + this vulnerability, but it could be used to compromise other sites + hosted on the same domain as Buildbot. + + - cookie injection a master domain (ie if your buildbot is on + buildbot.buildbot.net, one can inject a cookie on *.buildbot.net, + which could impact another website hosted in your domain) + + - HTTP response splitting and cache poisoning (browser or proxy) are + also typical impact of this vulnerability class, but might be impractical + to exploit. + </p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/buildbot/buildbot/wiki/CRLF-injection-in-Buildbot-login-and-logout-redirect-code</url> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7313</url> + <cvename>CVE-2019-7313</cvename> + </references> + <dates> + <discovery>2019-01-29</discovery> + <entry>2019-04-26</entry> + </dates> + </vuln> + <vuln vid="2bad8b5d-66fb-11e9-9815-78acc0a3b880"> <topic>drupal -- Drupal core - Moderately critical</topic> <affects> |