diff options
author | miwi <miwi@FreeBSD.org> | 2006-10-23 21:15:30 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2006-10-23 21:15:30 +0800 |
commit | 210c6cb0ecd4ea8b688a6767c4d2849abc1cf690 (patch) | |
tree | 54b7817205d3d27c9cacd0d0dc672715dc2e07a4 /security | |
parent | 934b2052977619f7ac23d3cbbda869c2f0a49879 (diff) | |
download | freebsd-ports-gnome-210c6cb0ecd4ea8b688a6767c4d2849abc1cf690.tar.gz freebsd-ports-gnome-210c6cb0ecd4ea8b688a6767c4d2849abc1cf690.tar.zst freebsd-ports-gnome-210c6cb0ecd4ea8b688a6767c4d2849abc1cf690.zip |
- Add entry for www/serendipity and www/serendipity-devel
Reviewed by: markus@
Approved by: portmgr (implicit VuXML), secteam (Remko (not reviewed yet))
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 28658662e2c7..c080df1c845d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,41 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="96ed277b-60e0-11db-ad2d-0016179b2dd5"> + <topic>Serendipity -- XSS Vulnerabilities</topic> + <affects> + <package> + <name>serendipity</name> + <range><lt>1.0.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Serendipity Team reports:</p> + <blockquote cite="http://blog.s9y.org/archives/147-Serendipity-1.0.2-and-1.1-beta5-released.html"> + <p>Serendipity failed to correctly sanitize user input on the + media manager administration page. The content of GET variables + were written into JavaScript strings. By using standard string + evasion techniques it was possible to execute arbitrary + JavaScript.</p> + <p>Additionally Serendipity dynamically created a HTML form on + the media manager administration page that contained all + variables found in the URL as hidden fields. While the variable + values were correctly escaped it was possible to break out + by specifying strange variable names.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.hardened-php.net/advisory_112006.136.htmlSerendipity</url> + <url>http://secunia.com/advisories/22501/</url> + </references> + <dates> + <discovery>2006-10-19</discovery> + <entry>2006-10-21</entry> + </dates> + </vuln> + <vuln vid="d8fbf13a-6215-11db-a59e-0211d85f11fb"> <topic>kdelibs -- integer overflow in khtml</topic> <affects> |