diff options
author | miwi <miwi@FreeBSD.org> | 2009-12-26 03:19:35 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2009-12-26 03:19:35 +0800 |
commit | e350ddbf222a47459c2eb1bcb90d087c11f0166e (patch) | |
tree | 7764a32a09d674eacc6b357eecc54bcad8d67bfc /security | |
parent | d6abb7ba7aed27572cbe4b933dc66c49bd6c949b (diff) | |
download | freebsd-ports-gnome-e350ddbf222a47459c2eb1bcb90d087c11f0166e.tar.gz freebsd-ports-gnome-e350ddbf222a47459c2eb1bcb90d087c11f0166e.tar.zst freebsd-ports-gnome-e350ddbf222a47459c2eb1bcb90d087c11f0166e.zip |
- Document drupal -- multiple cross-site scripting
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 58c887337d6d..fad324ea2e05 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -35,6 +35,44 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="751823d4-f189-11de-9344-00248c9b4be7"> + <topic>drupal -- multiple cross-site scripting</topic> + <affects> + <package> + <name>drupal5</name> + <range><lt>5.21</lt></range> + </package> + <package> + <name>drupal6</name> + <range><lt>6.15</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Drupal Team reports:</p> + <blockquote cite="http://drupal.org/node/661586"> + <p>The Contact module does not correctly handle certain user input + when displaying category information. Users privileged to create + contact categories can insert arbitrary HTML and script code into the + contact module administration page. Such a cross-site scripting attack + may lead to the malicious user gaining administrative access.</p> + <p>The Menu module does not correctly handle certain user input when + displaying the menu administration overview. Users privileged to + create new menus can insert arbitrary HTML and script code into the + menu module administration page. Such a cross-site scripting attack + may lead to the malicious user gaining administrative access.</p> + </blockquote> + </body> + </description> + <references> + <url>http://drupal.org/node/661586</url> + </references> + <dates> + <discovery>2009-12-16</discovery> + <entry>2009-12-25</entry> + </dates> + </vuln> + <vuln vid="4d6076fe-ee7a-11de-9cd0-001a926c7637"> <topic>fuser -- missing user's privileges check</topic> <affects> |