diff options
author | wen <wen@FreeBSD.org> | 2017-11-19 10:38:29 +0800 |
---|---|---|
committer | wen <wen@FreeBSD.org> | 2017-11-19 10:38:29 +0800 |
commit | 3bd3929f619963bcdfc1517f13be1eef8ea27f44 (patch) | |
tree | b85c6be11d4ef8dd5eac91d350dee3896f6d5d81 /security | |
parent | 2653a5b5a8b3cf1df5271bc16f6132255610e87b (diff) | |
download | freebsd-ports-gnome-3bd3929f619963bcdfc1517f13be1eef8ea27f44.tar.gz freebsd-ports-gnome-3bd3929f619963bcdfc1517f13be1eef8ea27f44.tar.zst freebsd-ports-gnome-3bd3929f619963bcdfc1517f13be1eef8ea27f44.zip |
- Document vulnerability in www/mediawiki127, www/mediawiki128 and www/mediawiki129.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 52 |
1 files changed, 52 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b95f8815cbea..2de64bb4ab2f 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,58 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="298829e2-ccce-11e7-92e4-000c29649f92"> + <topic>mediawiki -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mediawiki127</name> + <range><lt>1.27.3</lt></range> + </package> + <package> + <name>mediawiki128</name> + <range><lt>1.28.2</lt></range> + </package> + <package> + <name>mediawiki129</name> + <range><lt>1.29.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>mediawiki reports:</p> + <blockquote cite="https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html"> + <p>security fixes:</p> + <p>T128209: Reflected File Download from api.php. Reported by Abdullah Hussam.</p> + <p>T165846: BotPasswords doesn't throttle login attempts.</p> + <p>T134100: On private wikis, login form shouldn't distinguish between login failure due to bad username and bad password.</p> + <p>T178451: XSS when $wgShowExceptionDetails = false and browser sends non-standard url escaping.</p> + <p>T176247: It's possible to mangle HTML via raw message parameter expansion.</p> + <p>T125163: id attribute on headlines allow raw.</p> + <p>T124404: language converter can be tricked into replacing text inside tags by adding a lot of junk after the rule definition.</p> + <p>T119158: Language converter: unsafe attribute injection via glossary rules.</p> + <p>T180488: api.log contains passwords in plaintext wasn't correctly fixed.</p> + <p>T180231: composer.json has require-dev versions of PHPUnit with known security issues. Reported by Tom Hutchison.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2017-8808</cvename> + <cvename>CVE-2017-8809</cvename> + <cvename>CVE-2017-8810</cvename> + <cvename>CVE-2017-8811</cvename> + <cvename>CVE-2017-8812</cvename> + <cvename>CVE-2017-8814</cvename> + <cvename>CVE-2017-8815</cvename> + <cvename>CVE-2017-0361</cvename> + <cvename>CVE-2017-9841</cvename> + <url>https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html</url> + </references> + <dates> + <discovery>2017-11-14</discovery> + <entry>2017-11-19</entry> + </dates> + </vuln> + <vuln vid="52f10525-caff-11e7-b590-6451062f0f7a"> <topic>Flash Player -- multiple vulnerabilities</topic> <affects> |