diff options
author | sat <sat@FreeBSD.org> | 2006-10-06 05:34:25 +0800 |
---|---|---|
committer | sat <sat@FreeBSD.org> | 2006-10-06 05:34:25 +0800 |
commit | ddb7568bf0e5e7d5805b7a6edacf9a48e6651b5d (patch) | |
tree | 0e0703f55f0c752e6a9a8566ec9645f0bd7a825d /security | |
parent | 53fe5804ee5960cb79f38c6d928c2a99527a7299 (diff) | |
download | freebsd-ports-gnome-ddb7568bf0e5e7d5805b7a6edacf9a48e6651b5d.tar.gz freebsd-ports-gnome-ddb7568bf0e5e7d5805b7a6edacf9a48e6651b5d.tar.zst freebsd-ports-gnome-ddb7568bf0e5e7d5805b7a6edacf9a48e6651b5d.zip |
- Update an old mambo advisory and document its new vulnerabilities
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 58 |
1 files changed, 57 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 8f1597d711f4..20ead4df288d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,57 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8a5770b4-54b5-11db-a5ae-00508d6a62df"> + <topic>mambo -- multiple SQL injection vulnerabilities</topic> + <affects> + <package> + <name>mambo</name> + <range><ge>0</ge></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>James Bercegay reports:</p> + <blockquote cite="http://www.gulftech.org/?node=research&article_id=00116-10042006"> + <p>Mambo is vulnerable to an Authentication Bypass issue that + is due to an SQL Injection in the login function. The SQL + Injection is possible because the $passwd variable is only + sanitized when it is not passed as an argument to the + function.</p> + </blockquote> + <p>Omid reports:</p> + <blockquote cite="http://seclists.org/bugtraq/2006/Aug/0491.html"> + <p>There are several sql injections in Mambo 4.6 RC2 & + Joomla 1.0.10 (and maybe other versions):</p> + <ul> + <li>When a user edits a content, the "id" parameter is not + checked properly in /components/com_content/content.php, + which can cause 2 sql injections.</li> + <li>The "limit" parameter in the administration section is + not checked. This affects many pages of administration + section</li> + <li>In the administration section, while editing/creating a + user, the "gid" parameter is not checked properly.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <bid>19719</bid> + <bid>19734</bid> + <url>http://www.gulftech.org/?node=research&article_id=00116-10042006</url> + <url>http://seclists.org/bugtraq/2006/Aug/0491.html</url> + <url>http://www.frsirt.com/english/advisories/2006/3918</url> + <url>http://mamboxchange.com/forum/forum.php?forum_id=7704</url> + <url>http://secunia.com/advisories/21644/</url> + <url>http://secunia.com/advisories/22221/</url> + </references> + <dates> + <discovery>2006-08-26</discovery> + <entry>2006-10-05</entry> + </dates> + </vuln> + <vuln vid="19a92df1-548d-11db-8f1a-000a48049292"> <topic>tin -- buffer overflow vulnerabilities</topic> <affects> @@ -2352,16 +2403,21 @@ Note: Please add new entries to the beginning of this file. </body> </description> <references> + <bid>16775</bid> + <cvename>CVE-2006-0871</cvename> + <cvename>CVE-2006-1794</cvename> <cvename>CVE-2006-3262</cvename> <cvename>CVE-2006-3263</cvename> <mlist msgid="20060617123242.1684.qmail@securityfocus.com">http://marc.theaimsgroup.com/?l=bugtraq&m=115056811230529</mlist> + <url>http://secunia.com/advisories/18935/</url> <url>http://secunia.com/advisories/20745/</url> <url>http://www.mamboserver.com/?option=com_content&task=view&id=207</url> + <url>http://www.gulftech.org/?node=research&article_id=00104-02242006</url> </references> <dates> <discovery>2006-06-19</discovery> <entry>2006-07-05</entry> - <modified>2006-07-11</modified> + <modified>2006-10-05</modified> </dates> </vuln> |