aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2009-02-11 18:15:25 +0800
committermiwi <miwi@FreeBSD.org>2009-02-11 18:15:25 +0800
commit2229c342559ca091a4c08c9e833b5b63f546697a (patch)
tree052e08521c1b41c79bdec8779416a31501efc182 /security
parentf09269239516f6e6d0d3d1f4bbd612eeef4bfd58 (diff)
downloadfreebsd-ports-gnome-2229c342559ca091a4c08c9e833b5b63f546697a.tar.gz
freebsd-ports-gnome-2229c342559ca091a4c08c9e833b5b63f546697a.tar.zst
freebsd-ports-gnome-2229c342559ca091a4c08c9e833b5b63f546697a.zip
- Document typo3 -- cross-site scripting and information disclosure
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml35
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c819738d86f7..bb5b6f126c15 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,41 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="cc47fafe-f823-11dd-94d9-0030843d3802">
+ <topic>typo3 -- cross-site scripting and information disclosure</topic>
+ <affects>
+ <package>
+ <name>typo3</name>
+ <range><lt>4.2.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/33829/">
+ <p>Some vulnerabilities have been reported in Typo3, which can be
+ exploited by malicious people to conduct cross-site scripting attacks
+ and disclose sensitive information.</p>
+ <p>Input passed via unspecified fields to the backend user interface
+ is not properly sanitised before being returned to the user. This can
+ be exploited to execute arbitrary HTML and script code in a user's
+ browser session in context of an affected site.</p>
+ <p>An error in the "jumpUrl" mechanism can be exploited to read
+ arbitrary files from local resources by disclosing a hash secret used
+ to restrict file access.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://secunia.com/advisories/33829/</url>
+ <url>http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/</url>
+ </references>
+ <dates>
+ <discovery>2009-02-10</discovery>
+ <entry>2009-02-11</entry>
+ </dates>
+ </vuln>
+
<vuln vid="a89b76a7-f6bd-11dd-94d9-0030843d3802">
<topic>amaya -- multiple buffer overflow vulnerabilities</topic>
<affects>