aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorwen <wen@FreeBSD.org>2017-11-19 10:38:29 +0800
committerwen <wen@FreeBSD.org>2017-11-19 10:38:29 +0800
commit3bd3929f619963bcdfc1517f13be1eef8ea27f44 (patch)
treeb85c6be11d4ef8dd5eac91d350dee3896f6d5d81 /security
parent2653a5b5a8b3cf1df5271bc16f6132255610e87b (diff)
downloadfreebsd-ports-gnome-3bd3929f619963bcdfc1517f13be1eef8ea27f44.tar.gz
freebsd-ports-gnome-3bd3929f619963bcdfc1517f13be1eef8ea27f44.tar.zst
freebsd-ports-gnome-3bd3929f619963bcdfc1517f13be1eef8ea27f44.zip
- Document vulnerability in www/mediawiki127, www/mediawiki128 and www/mediawiki129.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml52
1 files changed, 52 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index b95f8815cbea..2de64bb4ab2f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,58 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="298829e2-ccce-11e7-92e4-000c29649f92">
+ <topic>mediawiki -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mediawiki127</name>
+ <range><lt>1.27.3</lt></range>
+ </package>
+ <package>
+ <name>mediawiki128</name>
+ <range><lt>1.28.2</lt></range>
+ </package>
+ <package>
+ <name>mediawiki129</name>
+ <range><lt>1.29.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>mediawiki reports:</p>
+ <blockquote cite="https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html">
+ <p>security fixes:</p>
+ <p>T128209: Reflected File Download from api.php. Reported by Abdullah Hussam.</p>
+ <p>T165846: BotPasswords doesn't throttle login attempts.</p>
+ <p>T134100: On private wikis, login form shouldn't distinguish between login failure due to bad username and bad password.</p>
+ <p>T178451: XSS when $wgShowExceptionDetails = false and browser sends non-standard url escaping.</p>
+ <p>T176247: It's possible to mangle HTML via raw message parameter expansion.</p>
+ <p>T125163: id attribute on headlines allow raw.</p>
+ <p>T124404: language converter can be tricked into replacing text inside tags by adding a lot of junk after the rule definition.</p>
+ <p>T119158: Language converter: unsafe attribute injection via glossary rules.</p>
+ <p>T180488: api.log contains passwords in plaintext wasn't correctly fixed.</p>
+ <p>T180231: composer.json has require-dev versions of PHPUnit with known security issues. Reported by Tom Hutchison.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2017-8808</cvename>
+ <cvename>CVE-2017-8809</cvename>
+ <cvename>CVE-2017-8810</cvename>
+ <cvename>CVE-2017-8811</cvename>
+ <cvename>CVE-2017-8812</cvename>
+ <cvename>CVE-2017-8814</cvename>
+ <cvename>CVE-2017-8815</cvename>
+ <cvename>CVE-2017-0361</cvename>
+ <cvename>CVE-2017-9841</cvename>
+ <url>https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html</url>
+ </references>
+ <dates>
+ <discovery>2017-11-14</discovery>
+ <entry>2017-11-19</entry>
+ </dates>
+ </vuln>
+
<vuln vid="52f10525-caff-11e7-b590-6451062f0f7a">
<topic>Flash Player -- multiple vulnerabilities</topic>
<affects>