diff options
author | niels <niels@FreeBSD.org> | 2010-09-26 21:32:10 +0800 |
---|---|---|
committer | niels <niels@FreeBSD.org> | 2010-09-26 21:32:10 +0800 |
commit | 100acd7a29bee7bae0f4def0f197859e10870e23 (patch) | |
tree | 668b274ce1379806b8e8624b7c772e4d5e235a91 | |
parent | 82e71cc56df09214a86820da521cdbfe3aa6b35f (diff) | |
download | freebsd-ports-graphics-100acd7a29bee7bae0f4def0f197859e10870e23.tar.gz freebsd-ports-graphics-100acd7a29bee7bae0f4def0f197859e10870e23.tar.zst freebsd-ports-graphics-100acd7a29bee7bae0f4def0f197859e10870e23.zip |
Documented remote code execution vulnerability in OpenX
PR: ports/150610
Approved by: itetcu (mentor, implicit)
Security: ttp://blog.openx.org/09/security-update/
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 11979e0256f..d703a69ead7 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="80b6d6cc-c970-11df-bb18-0015587e2cc1"> + <topic>openx -- remote code execution vulnerability</topic> + <affects> + <package> + <name>openx</name> + <range><lt>2.8.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenX project reported:</p> + <blockquote cite="http://blog.openx.org/09/security-update/"> + <p>It has been brought to our attention that there is a vulnerability + in the 2.8 downloadable version of OpenX that can result in a server + running the downloaded version of OpenX being compromised.</p> + </blockquote> + <p>This vulnerability exists in the file upload functionality + and allows attackers to upload and execute PHP code of + their choice. </p> + </body> + </description> + <references> + <url>http://blog.openx.org/09/security-update/</url> + <url>http://www.h-online.com/security/news/item/Web-sites-distribute-malware-via-hacked-OpenX-servers-1079099.html</url> + </references> + <dates> + <discovery>2010-09-14</discovery> + <entry>2010-09-26</entry> + </dates> + </vuln> + <vuln vid="e4dac715-c818-11df-a92c-0015587e2cc1"> <topic>squid -- Denial of service vulnerability in request handling</topic> <affects> |