aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorglarkin <glarkin@FreeBSD.org>2009-02-11 22:15:25 +0800
committerglarkin <glarkin@FreeBSD.org>2009-02-11 22:15:25 +0800
commit9b5ce23619ad3859d490e2b79e69bdf06c00a8e1 (patch)
tree6f3e0a2867f70ca7168202129ebbcd3fdd386629
parentbd32557294fb02c648a07aeae6e7da05e2ba642f (diff)
downloadfreebsd-ports-gnome-9b5ce23619ad3859d490e2b79e69bdf06c00a8e1.tar.gz
freebsd-ports-gnome-9b5ce23619ad3859d490e2b79e69bdf06c00a8e1.tar.zst
freebsd-ports-gnome-9b5ce23619ad3859d490e2b79e69bdf06c00a8e1.zip
- document codeigniter -- arbitrary script execution in the new
Form Validationclass
-rw-r--r--security/vuxml/vuln.xml32
1 files changed, 31 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 58136d06a6d6..95cef71dbf5c 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,7 +34,37 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
- <vuln vid="b07f3254-f83a-11dd-85a4-ea653f0746ab">
+ <vuln vid="83574d5a-f828-11dd-9fdf-0050568452ac">
+ <topic>codeigniter -- arbitrary script execution in the new Form Validation class</topic>
+ <affects>
+ <package>
+ <name>codeigniter</name>
+ <range><ge>1.7.0</ge><lt>1.7.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>znirkel reports:</p>
+ <blockquote cite="http://secunia.com/advisories/33829/">
+ <p>The eval() function in _reset_post_array crashes when posting
+ certain data. By passing in carefully-crafted input data, the eval()
+ function could also execute malicious PHP code.</p>
+ <p>Note that CodeIgniter applications that either do not use the
+ new Form Validation class or use the old Validation class are not
+ affected by this vulnerability.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://codeigniter.com/bug_tracker/bug/6068/</url>
+ </references>
+ <dates>
+ <discovery>2008-11-28</discovery>
+ <entry>2009-02-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b07f3254-f83a-11dd-85a4-ea653f0746ab">
<topic>pyblosxom -- atom flavor multiple XML injection vulnerabilities</topic>
<affects>
<package>