diff options
author | mnag <mnag@FreeBSD.org> | 2005-11-30 21:41:53 +0800 |
---|---|---|
committer | mnag <mnag@FreeBSD.org> | 2005-11-30 21:41:53 +0800 |
commit | 0a844cf0d12745bc0e8f492c4a09d1196a7e487a (patch) | |
tree | 58fbd55c9d8b3260cde0c325ec4369c63a14a28e /security | |
parent | 7f50b12bced3cb500ae6b93f742daeeee1b175f5 (diff) | |
download | freebsd-ports-gnome-0a844cf0d12745bc0e8f492c4a09d1196a7e487a.tar.gz freebsd-ports-gnome-0a844cf0d12745bc0e8f492c4a09d1196a7e487a.tar.zst freebsd-ports-gnome-0a844cf0d12745bc0e8f492c4a09d1196a7e487a.zip |
Add entry to www/mambo
Reviewed by: simon
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0096d28dd8fe..b18d19eb92b6 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -35,6 +35,41 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ffb82d3a-610f-11da-8823-00123ffe8333"> + <topic>mambo -- "register_globals" emulation layer overwrite vulnerability</topic> + <affects> + <package> + <name>mambo</name> + <range><lt>4.5.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A Secunia Advisory reports:</p> + <blockquote cite="http://secunia.com/advisories/17622/"> + <p>peter MC tachatte has discovered a vulnerability in Mambo, + which can be exploited by malicious people to manipulate + certain information and compromise a vulnerable system.</p> + <p>The vulnerability is caused due to an error in the + "register_globals" emulation layer in "globals.php" where + certain arrays used by the system can be overwritten. This + can be exploited to include arbitrary files from external + and local resources via the "mosConfig_absolute_path" parameter.</p> + <p>Successful exploitation requires that "register_globals" + is disabled.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.mamboserver.com/index.php?option=com_content&task=view&id=172&Itemid=1</url> + <url>http://secunia.com/advisories/17622/</url> + </references> + <dates> + <discovery>2005-11-17</discovery> + <entry>2005-11-30</entry> + </dates> + </vuln> + <vuln vid="27a70a01-5f6c-11da-8d54-000cf18bbe54"> <topic>ghostscript -- insecure temporary file creation vulnerability</topic> <affects> |