diff options
author | sunpoet <sunpoet@FreeBSD.org> | 2017-09-07 04:08:12 +0800 |
---|---|---|
committer | sunpoet <sunpoet@FreeBSD.org> | 2017-09-07 04:08:12 +0800 |
commit | 9d8d45f7861a2ad62035fef45b9ec709dd276e2a (patch) | |
tree | 214ee102a05b2f745026ece47ee787dba53b6a26 /security/vuxml | |
parent | df2115c2046f6042ed10f79d13a6f555f30972f8 (diff) | |
download | freebsd-ports-gnome-9d8d45f7861a2ad62035fef45b9ec709dd276e2a.tar.gz freebsd-ports-gnome-9d8d45f7861a2ad62035fef45b9ec709dd276e2a.tar.zst freebsd-ports-gnome-9d8d45f7861a2ad62035fef45b9ec709dd276e2a.zip |
Document Django vulnerability
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 08f65b6a9b26..479863832c1c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,46 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="aaab03be-932d-11e7-92d8-4b26fc968492"> + <topic>Django -- possible XSS in traceback section of technical 500 debug page</topic> + <affects> + <package> + <name>py27-django110</name> + <name>py34-django110</name> + <name>py35-django110</name> + <name>py36-django110</name> + <range><lt>1.10.8</lt></range> + </package> + <package> + <name>py27-django111</name> + <name>py34-django111</name> + <name>py35-django111</name> + <name>py36-django111</name> + <range><lt>1.11.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Django blog:</p> + <blockquote cite="https://www.djangoproject.com/weblog/2017/sep/05/security-releases/"> + <p>In older versions, HTML autoescaping was disabled in a portion of the template + for the technical 500 debug page. Given the right circumstances, this allowed a + cross-site scripting attack. This vulnerability shouldn't affect most production + sites since you shouldn't run with DEBUG = True (which makes this page accessible) + in your production settings.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2017-12794</cvename> + <url>https://www.djangoproject.com/weblog/2017/sep/05/security-releases/</url> + </references> + <dates> + <discovery>2017-09-05</discovery> + <entry>2017-09-06</entry> + </dates> + </vuln> + <vuln vid="e1100e63-92f7-11e7-bd95-e8e0b747a45a"> <topic>chromium -- multiple vulnerabilities</topic> <affects> |