diff options
author | miwi <miwi@FreeBSD.org> | 2008-04-25 21:10:37 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2008-04-25 21:10:37 +0800 |
commit | 8a4315ac8a37b1a55f0b6c422f5abdcbd97ec779 (patch) | |
tree | fc09c5fc56ab373aa8237009885cd163b8f206e9 /security | |
parent | 91e38026d134a9a77bf284849eb251d2deb7f169 (diff) | |
download | freebsd-ports-gnome-8a4315ac8a37b1a55f0b6c422f5abdcbd97ec779.tar.gz freebsd-ports-gnome-8a4315ac8a37b1a55f0b6c422f5abdcbd97ec779.tar.zst freebsd-ports-gnome-8a4315ac8a37b1a55f0b6c422f5abdcbd97ec779.zip |
- Document mailman -- script insertion vulnerability.
Submitted by: tabthorpe (one a month ago)
Discussed/Reviewed by: tabthorpe
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index af13517df77a..f3b9f86885a7 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,43 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="f47f2746-12c5-11dd-bab7-0016179b2dd5"> + <topic>mailman -- script insertion vulnerability</topic> + <affects> + <package> + <name>ja-mailman</name> + <name>mailman</name> + <name>mailman-with-htdig</name> + <range><lt>2.1.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/28794"> + <p>A vulnerability has been reported in Mailman, which can be exploited + by malicious users to conduct script insertion attacks.</p> + <p>Certain input when editing the list templates and the list info attribute + is not properly sanitised before being stored. This can be exploited to + insert arbitrary HTML and script code, which is executed in a user's + browser session in context of an affected site when the malicious website + is accessed.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2008-0564</cvename> + <bid>27630</bid> + <url>http://www.ubuntu.com/usn/usn-586-1</url> + <url>http://secunia.com/advisories/28794</url> + <url>http://sourceforge.net/project/shownotes.php?release_id=593924</url> + </references> + <dates> + <discovery>2008-02-05</discovery> + <entry>2008-04-25</entry> + </dates> + </vuln> + <vuln vid="86c05550-12c1-11dd-bab7-0016179b2dd5"> <topic>mksh -- TTY attachment privilege escalation</topic> <affects> |