aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorjadawin <jadawin@FreeBSD.org>2009-02-11 21:36:14 +0800
committerjadawin <jadawin@FreeBSD.org>2009-02-11 21:36:14 +0800
commitbd32557294fb02c648a07aeae6e7da05e2ba642f (patch)
tree6bf5c98f094c464e3b9307bbfc07a135d0394ffb /security
parent46a4161ec88160f69d6ecd883190ffc3c7b76ff4 (diff)
downloadfreebsd-ports-gnome-bd32557294fb02c648a07aeae6e7da05e2ba642f.tar.gz
freebsd-ports-gnome-bd32557294fb02c648a07aeae6e7da05e2ba642f.tar.zst
freebsd-ports-gnome-bd32557294fb02c648a07aeae6e7da05e2ba642f.zip
- Document pyblosxom -- atom flavor multiple XML injection vulnerabilities
Reviewed by: miwi
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml33
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index bb5b6f126c15..58136d06a6d6 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,39 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="b07f3254-f83a-11dd-85a4-ea653f0746ab">
+ <topic>pyblosxom -- atom flavor multiple XML injection vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>pyblosxom</name>
+ <range><ge>0</ge></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Security Focus reports:</p>
+ <blockquote cite="http://www.securityfocus.com/bid/33676/">
+ <p>PyBlosxom is prone to multiple XML-injection
+ vulnerabilities because the application fails to
+ properly sanitize user-supplied input before using it
+ in dynamically generated content.</p>
+ <p>Attacker-supplied XML and script code would run in the
+ context of the affected browser, potentially allowing
+ the attacker to steal cookie-based authentication credentials
+ or to control how the site is rendered to the user. Other attacks
+ are also possible.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>33676</bid>
+ </references>
+ <dates>
+ <discovery>2009-02-09</discovery>
+ <entry>2009-02-11</entry>
+ </dates>
+ </vuln>
+
<vuln vid="cc47fafe-f823-11dd-94d9-0030843d3802">
<topic>typo3 -- cross-site scripting and information disclosure</topic>
<affects>