aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorflo <flo@FreeBSD.org>2014-10-17 02:19:57 +0800
committerflo <flo@FreeBSD.org>2014-10-17 02:19:57 +0800
commitcb415358e0d3c9d7d11a3f28b6a12219e685b40f (patch)
tree3a418a723f3dd4e331927bdcb52ce5715895e140 /security
parenta1a903af57ef9608cbf423c5d956cc75e12b6e0e (diff)
downloadfreebsd-ports-gnome-cb415358e0d3c9d7d11a3f28b6a12219e685b40f.tar.gz
freebsd-ports-gnome-cb415358e0d3c9d7d11a3f28b6a12219e685b40f.tar.zst
freebsd-ports-gnome-cb415358e0d3c9d7d11a3f28b6a12219e685b40f.zip
Document critical SQL Injection Vulnerability in www/drupal7
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 098933333d2b..114d963cb505 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -57,6 +57,40 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="6f825fa4-5560-11e4-a4c3-00a0986f28c4">
+ <topic>drupal7 -- SQL injection</topic>
+ <affects>
+ <package>
+ <name>drupal7</name>
+ <range><lt>7.32</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Security Team reports:</p>
+ <blockquote cite="https://drupal.org/SA-CORE-2013-003">
+ <p>Drupal 7 includes a database abstraction API to ensure that
+ queries executed against the database are sanitized to prevent
+ SQL injection attacks.
+ A vulnerability in this API allows an attacker to send
+ specially crafted requests resulting in arbitrary SQL execution.
+ Depending on the content of the requests this can lead to
+ privilege escalation, arbitrary PHP execution, or other attacks.
+ This vulnerability can be exploited by anonymous users.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-3704</cvename>
+ <url>https://www.drupal.org/SA-CORE-2014-005</url>
+ <url>https://www.sektioneins.de/en/blog/14-10-15-drupal-sql-injection-vulnerability.html</url>
+ </references>
+ <dates>
+ <discovery>2014-10-15</discovery>
+ <entry>2014-10-16</entry>
+ </dates>
+ </vuln>
+
<vuln vid="03175e62-5494-11e4-9cc1-bc5ff4fb5e7b">
<topic>OpenSSL -- multiple vulnerabilities</topic>
<affects>