aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorfeld <feld@FreeBSD.org>2018-09-12 00:13:58 +0800
committerfeld <feld@FreeBSD.org>2018-09-12 00:13:58 +0800
commitca2c4bdf4743c9345f3b796c0d45f47701bdb3dc (patch)
treef83f450154a21bd267d928c57c02160a83b27c43 /security
parent6ee35aff9fbfea2279e850248d1874e442a737d1 (diff)
downloadfreebsd-ports-gnome-ca2c4bdf4743c9345f3b796c0d45f47701bdb3dc.tar.gz
freebsd-ports-gnome-ca2c4bdf4743c9345f3b796c0d45f47701bdb3dc.tar.zst
freebsd-ports-gnome-ca2c4bdf4743c9345f3b796c0d45f47701bdb3dc.zip
Improve formatting
Also add plexmediaserver-plexpass package as vulnerable
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml19
1 files changed, 10 insertions, 9 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 5634b054fc10..8e30d138414e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -63,6 +63,7 @@ Notes:
<affects>
<package>
<name>plexmediaserver</name>
+ <name>plexmediaserver-plexpass</name>
<range><lt>1.13.5.5332</lt></range>
</package>
</affects>
@@ -71,17 +72,17 @@ Notes:
<p>Chris reports:</p>
<blockquote cite="https://seclists.org/fulldisclosure/2018/Aug/1">
<p>The XML parsing engine for Plex Media Server's SSDP/UPNP
- functionality is vulnerable to an XML External Entity
+ functionality is vulnerable to an XML External Entity
Processing (XXE) attack. Unauthenticated attackers on the same LAN can
use this vulnerability to:</p>
- <li>
- <ul>Access arbitrary files from the filesystem with the same permission as
- the user account running Plex.</ul>
- <ul>Initiate SMB connections to capture NetNTLM challenge/response and
- crack to clear-text password.</ul>
- <ul>Initiate SMB connections to relay NetNTLM challenge/response and
- achieve Remote Command Execution in Windows domains.</ul>
- </li>
+ <ul>
+ <li>Access arbitrary files from the filesystem with the same permission as
+ the user account running Plex.</li>
+ <li>Initiate SMB connections to capture NetNTLM challenge/response and
+ crack to clear-text password.</li>
+ <li>Initiate SMB connections to relay NetNTLM challenge/response and
+ achieve Remote Command Execution in Windows domains.</li>
+ </ul>
</blockquote>
</body>
</description>