aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2009-12-26 03:19:35 +0800
committermiwi <miwi@FreeBSD.org>2009-12-26 03:19:35 +0800
commite350ddbf222a47459c2eb1bcb90d087c11f0166e (patch)
tree7764a32a09d674eacc6b357eecc54bcad8d67bfc /security
parentd6abb7ba7aed27572cbe4b933dc66c49bd6c949b (diff)
downloadfreebsd-ports-gnome-e350ddbf222a47459c2eb1bcb90d087c11f0166e.tar.gz
freebsd-ports-gnome-e350ddbf222a47459c2eb1bcb90d087c11f0166e.tar.zst
freebsd-ports-gnome-e350ddbf222a47459c2eb1bcb90d087c11f0166e.zip
- Document drupal -- multiple cross-site scripting
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml38
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 58c887337d6d..fad324ea2e05 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -35,6 +35,44 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="751823d4-f189-11de-9344-00248c9b4be7">
+ <topic>drupal -- multiple cross-site scripting</topic>
+ <affects>
+ <package>
+ <name>drupal5</name>
+ <range><lt>5.21</lt></range>
+ </package>
+ <package>
+ <name>drupal6</name>
+ <range><lt>6.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Team reports:</p>
+ <blockquote cite="http://drupal.org/node/661586">
+ <p>The Contact module does not correctly handle certain user input
+ when displaying category information. Users privileged to create
+ contact categories can insert arbitrary HTML and script code into the
+ contact module administration page. Such a cross-site scripting attack
+ may lead to the malicious user gaining administrative access.</p>
+ <p>The Menu module does not correctly handle certain user input when
+ displaying the menu administration overview. Users privileged to
+ create new menus can insert arbitrary HTML and script code into the
+ menu module administration page. Such a cross-site scripting attack
+ may lead to the malicious user gaining administrative access.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://drupal.org/node/661586</url>
+ </references>
+ <dates>
+ <discovery>2009-12-16</discovery>
+ <entry>2009-12-25</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4d6076fe-ee7a-11de-9cd0-001a926c7637">
<topic>fuser -- missing user's privileges check</topic>
<affects>