diff options
author | culot <culot@FreeBSD.org> | 2011-06-22 01:49:59 +0800 |
---|---|---|
committer | culot <culot@FreeBSD.org> | 2011-06-22 01:49:59 +0800 |
commit | 6ee6444c6cef1240f0fb884e22eb32d367b97302 (patch) | |
tree | 6eefdb0b93d0435c1880132aff1ef4b8d252ffe5 /security | |
parent | 39f2f2c80f4db64d9f1dae5cdc4722e8a4562582 (diff) | |
download | freebsd-ports-gnome-6ee6444c6cef1240f0fb884e22eb32d367b97302.tar.gz freebsd-ports-gnome-6ee6444c6cef1240f0fb884e22eb32d367b97302.tar.zst freebsd-ports-gnome-6ee6444c6cef1240f0fb884e22eb32d367b97302.zip |
Document piwik remote command execution vulnerability.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 1dd3feaf3bb2..2506660a0cc3 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,39 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="23c8423e-9bff-11e0-8ea2-0019d18c446a"> + <topic>piwik -- remote command execution vulnerability</topic> + <affects> + <package> + <name>piwik</name> + <range><ge>1.2</ge><lt>1.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Piwik security advisory reports:</p> + <blockquote cite="http://piwik.org/blog/2011/06/piwik-1-5-security-advisory/"> + <p>The Piwik 1.5 release addresses a critical security vulnerability, + which affect all Piwik users that have let granted some access to + the "anonymous" user.</p> + <p>Piwik contains a remotely exploitable vulnerabiliy that could + allow a remote attacker to execute arbitrary code. Only + installations that have granted untrusted view access to their + stats (ie. grant "view" access to a website to anonymous) are at + risk.</p> + </blockquote> + </body> + </description> + <references> + <freebsdpr>ports/158084</freebsdpr> + <url>http://piwik.org/blog/2011/06/piwik-1-5-security-advisory/</url> + </references> + <dates> + <discovery>2011-06-21</discovery> + <entry>2011-06-21</entry> + </dates> + </vuln> + <vuln vid="0b535cd0-9b90-11e0-800a-00215c6a37bb"> <topic>dokuwiki -- cross site scripting vulnerability</topic> <affects> |