aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorsunpoet <sunpoet@FreeBSD.org>2017-09-07 04:08:12 +0800
committersunpoet <sunpoet@FreeBSD.org>2017-09-07 04:08:12 +0800
commit9d8d45f7861a2ad62035fef45b9ec709dd276e2a (patch)
tree214ee102a05b2f745026ece47ee787dba53b6a26 /security/vuxml
parentdf2115c2046f6042ed10f79d13a6f555f30972f8 (diff)
downloadfreebsd-ports-gnome-9d8d45f7861a2ad62035fef45b9ec709dd276e2a.tar.gz
freebsd-ports-gnome-9d8d45f7861a2ad62035fef45b9ec709dd276e2a.tar.zst
freebsd-ports-gnome-9d8d45f7861a2ad62035fef45b9ec709dd276e2a.zip
Document Django vulnerability
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml40
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 08f65b6a9b26..479863832c1c 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,46 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="aaab03be-932d-11e7-92d8-4b26fc968492">
+ <topic>Django -- possible XSS in traceback section of technical 500 debug page</topic>
+ <affects>
+ <package>
+ <name>py27-django110</name>
+ <name>py34-django110</name>
+ <name>py35-django110</name>
+ <name>py36-django110</name>
+ <range><lt>1.10.8</lt></range>
+ </package>
+ <package>
+ <name>py27-django111</name>
+ <name>py34-django111</name>
+ <name>py35-django111</name>
+ <name>py36-django111</name>
+ <range><lt>1.11.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Django blog:</p>
+ <blockquote cite="https://www.djangoproject.com/weblog/2017/sep/05/security-releases/">
+ <p>In older versions, HTML autoescaping was disabled in a portion of the template
+ for the technical 500 debug page. Given the right circumstances, this allowed a
+ cross-site scripting attack. This vulnerability shouldn't affect most production
+ sites since you shouldn't run with DEBUG = True (which makes this page accessible)
+ in your production settings.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2017-12794</cvename>
+ <url>https://www.djangoproject.com/weblog/2017/sep/05/security-releases/</url>
+ </references>
+ <dates>
+ <discovery>2017-09-05</discovery>
+ <entry>2017-09-06</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e1100e63-92f7-11e7-bd95-e8e0b747a45a">
<topic>chromium -- multiple vulnerabilities</topic>
<affects>