diff options
author | madpilot <madpilot@FreeBSD.org> | 2014-11-20 16:42:28 +0800 |
---|---|---|
committer | madpilot <madpilot@FreeBSD.org> | 2014-11-20 16:42:28 +0800 |
commit | a389ac396316e82d4c41141473379f386485c5aa (patch) | |
tree | 22d27ce62eb405b75b920a5682db5ef0a0d61ee8 /security | |
parent | b236d34a1884c058364cbd40a5d33d94f9ff90f0 (diff) | |
download | freebsd-ports-gnome-a389ac396316e82d4c41141473379f386485c5aa.tar.gz freebsd-ports-gnome-a389ac396316e82d4c41141473379f386485c5aa.tar.zst freebsd-ports-gnome-a389ac396316e82d4c41141473379f386485c5aa.zip |
Document yii vulnerability CVE-2014-4672.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 44d2e794c5b6..a59bb87b578e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -57,6 +57,46 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="5a35bc56-7027-11e4-a4a3-001999f8d30b"> + <topic>yii -- Remote arbitrary PHP code execution</topic> + <affects> + <package> + <name>yii</name> + <range><lt>1.1.15</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Yii PHP Framework developers report:</p> + <blockquote cite="http://www.yiiframework.com/news/78/yii-1-1-15-is-released-security-fix/"> + <p>We are releasing Yii 1.1.15 to fix a security issue + found in 1.1.14. We urge all 1.1.14 users to upgrade their + Yii to this latest release. Note that the issue only + affects 1.1.14. All previous releases are not affected. + Upgrading to this release from 1.1.14 is very safe and + will not break your existing code.</p> + <p>The vulnerability is in the CDetailView widget. When + a Yii application uses this widget and configures the + "value" property of a CDetailView attribute using end + user inputs, it may allow attackers to potentially execute + arbitrary PHP scripts on the server. We are not showing + how to exploit it here to allow users to upgrade before + details about the exploit become publicly known. To our + knowledge the details of this issue are only known to + core team members.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2014-4672</cvename> + <url>http://www.yiiframework.com/news/78/yii-1-1-15-is-released-security-fix</url> + </references> + <dates> + <discovery>2014-07-03</discovery> + <entry>2014-11-19</entry> + </dates> + </vuln> + <vuln vid="d395e44f-6f4f-11e4-a444-00262d5ed8ee"> <topic>chromium -- multiple vulnerabilities</topic> <affects> |