diff options
author | delphij <delphij@FreeBSD.org> | 2011-09-13 09:11:03 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2011-09-13 09:11:03 +0800 |
commit | 9ed8594bd490014ac055164ae362c873cc87b3ed (patch) | |
tree | bf34b39f1393622620788213c8e38f5fe867b39e /security | |
parent | 28e94ebd2205e42f06c9d5f1e2835232f306e98a (diff) | |
download | freebsd-ports-gnome-9ed8594bd490014ac055164ae362c873cc87b3ed.tar.gz freebsd-ports-gnome-9ed8594bd490014ac055164ae362c873cc87b3ed.tar.zst freebsd-ports-gnome-9ed8594bd490014ac055164ae362c873cc87b3ed.zip |
Document roundcube XSS vulnerability.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c995700ae7d4..dd16a88e659e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="4ae68e7c-dda4-11e0-a906-00215c6a37bb"> + <topic>roundcube -- XSS vulnerability</topic> + <affects> + <package> + <name>roundcube</name> + <range><lt>0.5.4,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>RoundCube development Team reports:</p> + <blockquote cite="http://sourceforge.net/news/?group_id=139281&id=302769"> + <p>We just published a new release which fixes a recently + reported XSS vulnerability as an update to the stable + 0.5 branch. Please update your installations with this + new version or patch them with the fix which is also + published in the downloads section or our sourceforge.net + page.</p> + </blockquote> + <p>and:</p> + <blockquote cite="http://trac.roundcube.net/ticket/1488030"> + <p>During one of pen-tests I found that _mbox parameter + is not properly sanitized and reflected XSS attack is + possible.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-2937</cvename> + </references> + <dates> + <discovery>2011-08-09</discovery> + <entry>2011-09-13</entry> + </dates> + </vuln> + <vuln vid="b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6"> <topic>libsndfile -- PAF file processing integer overflow</topic> <affects> |