diff options
author | miwi <miwi@FreeBSD.org> | 2010-03-09 06:50:43 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2010-03-09 06:50:43 +0800 |
commit | 267029cafb1a238ca98b9e5410c7608978f467fc (patch) | |
tree | 902bb624981efa90d3a1f7a0e8a630c1fdbb1761 /security | |
parent | 06462ac460aef6317e02835d4a02d98169f3d91f (diff) | |
download | freebsd-ports-gnome-267029cafb1a238ca98b9e5410c7608978f467fc.tar.gz freebsd-ports-gnome-267029cafb1a238ca98b9e5410c7608978f467fc.tar.zst freebsd-ports-gnome-267029cafb1a238ca98b9e5410c7608978f467fc.zip |
- Document drupal -- multiple vulnerabilities
Feature safe: yep
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d501ecb7ee2c..4be9607b6764 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,51 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b3531fe1-2b03-11df-b6db-00248c9b4be7"> + <topic>drupal -- multiple vulnerabilities</topic> + <affects> + <package> + <name>drupal5</name> + <range><lt>5.22</lt></range> + </package> + <package> + <name>drupal6</name> + <range><lt>6.16</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Drupal Team reports:</p> + <blockquote cite="http://drupal.org/node/731710"> + <p>A user-supplied value is directly output during installation + allowing a malicious user to craft a URL and perform a cross-site + scripting attack. The exploit can only be conducted on sites not yet + installed.</p> + <p>The API function drupal_goto() is susceptible to a phishing attack. + An attacker could formulate a redirect in a way that gets the Drupal + site to send the user to an arbitrarily provided URL. No user + submitted data will be sent to that URL.</p> + <p>Locale module and dependent contributed modules do not sanitize the + display of language codes, native and English language names properly. + While these usually come from a preselected list, arbitrary + administrator input is allowed. This vulnerability is mitigated by the + fact that the attacker must have a role with the 'administer + languages' permission.</p> + <p>Under certain circumstances, a user with an open session that is + blocked can maintain his/her session on the Drupal site, despite being + blocked.</p> + </blockquote> + </body> + </description> + <references> + <url>http://drupal.org/node/731710</url> + </references> + <dates> + <discovery>2010-03-03</discovery> + <entry>2010-03-08</entry> + </dates> + </vuln> + <vuln vid="018a84d0-2548-11df-b4a3-00e0815b8da8"> <topic>sudo -- Privilege escalation with sudoedit</topic> <affects> |