aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorwen <wen@FreeBSD.org>2009-12-12 18:58:58 +0800
committerwen <wen@FreeBSD.org>2009-12-12 18:58:58 +0800
commit464ad05e281c20cffedc25d12c6112da466f6806 (patch)
tree3d4d3367d5661bbc1f255ff0e72f41d8d18ff2e8 /security
parent39f36c7c81739c014592c09f63e517507cb84875 (diff)
downloadfreebsd-ports-gnome-464ad05e281c20cffedc25d12c6112da466f6806.tar.gz
freebsd-ports-gnome-464ad05e281c20cffedc25d12c6112da466f6806.tar.zst
freebsd-ports-gnome-464ad05e281c20cffedc25d12c6112da466f6806.zip
- Document pligg -- Cross-Site Scripting and Cross-Site Request Forgery
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml40
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 5c7e29ce815f..983eb6407c30 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -35,6 +35,46 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="bec38383-e6cb-11de-bdd4-000c2930e89b">
+ <topic>pligg -- Cross-Site Scripting and Cross-Site Request Forgery</topic>
+ <affects>
+ <package>
+ <name>pligg</name>
+ <range><lt>1.0.3b</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/37349">
+ <p>Russ McRee has discovered some vulnerabilities in Pligg, which can
+ be exploited by malicious people to conduct cross-site scripting and
+ request forgery attacks.</p>
+ <p>Input passed via the "Referer" HTTP header to various scripts (e.g.
+ admin/admin_config.php, admin/admin_modules.php, delete.php, editlink.php,
+ submit.php, submit_groups.php, user_add_remove_links.php, and
+ user_settings.php) is not properly sanitised before being returned to
+ the user. This can be exploited to execute arbitrary HTML and script
+ code in a user's browser session in context of an affected site.</p>
+ <p>The application allows users to perform certain actions via HTTP
+ requests without performing any validity checks to verify the requests.
+ This can be exploited to e.g. create an arbitrary user with administrative
+ privileges if a logged-in administrative user visits a malicious web
+ site.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://secunia.com/advisories/37349/</url>
+ <url>http://www.pligg.com/blog/775/pligg-cms-1-0-3-release/</url>
+ </references>
+ <dates>
+ <discovery>2009-12-02</discovery>
+ <entry>2009-12-12</entry>
+ </dates>
+ </vuln>
+
+<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="fcbf56dd-e667-11de-920a-00248c9b4be7">
<topic>piwik -- php code execution</topic>
<affects>