diff options
author | Sergey Skvortsov <skv@FreeBSD.org> | 2008-08-15 16:26:00 +0000 |
---|---|---|
committer | Sergey Skvortsov <skv@FreeBSD.org> | 2008-08-15 16:26:00 +0000 |
commit | e5d68d78ab1747694989d79768745887d51fd563 (patch) | |
tree | 4f2d500c420a1e9a376f80d3f83e71ca9e0c1691 | |
parent | 5d5e8449a4388d6fb921032c3fa579ea7110ce17 (diff) | |
download | ports-e5d68d78ab1747694989d79768745887d51fd563.tar.gz ports-e5d68d78ab1747694989d79768745887d51fd563.zip |
Notes
-rw-r--r-- | security/vuxml/vuln.xml | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 59b3f8b8d066..eb842afa2fac 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,45 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1d96305d-6ae6-11dd-91d5-000c29d47fd7"> + <topic>Bugzilla -- Directory Traversal in importxml.pl</topic> + <affects> + <package> + <name>bugzilla</name> + <name>ja-bugzilla</name> + <range><ge>2.22.1</ge><lt>2.22.4</lt></range> + <range><ge>3.*</ge><lt>3.0.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A Bugzilla Security Advisory reports:</p> + <blockquote cite="http://www.bugzilla.org/security/2.22.4/"> + <p>When importing bugs using importxml.pl, the --attach_path + option can be specified, pointing to the directory where + attachments to import are stored. If the XML file being + read by importxml.pl contains a malicious + <pre>../relative_path/to/local_file</pre> + node, the script follows this relative path and attaches the + local file pointed by it to the bug, making the file public. + The security fix makes sure the relative path is always + ignored.</p> + <p>Most Bugzilla installations will not be vulnerable, as + they do not use --attach_path with importxml.pl. + (In fact, most installations don't use importxml.pl at all.) + </p> + </blockquote> + </body> + </description> + <references> + <url>https://bugzilla.mozilla.org/show_bug.cgi?id=437169</url> + </references> + <dates> + <discovery>2008-06-03</discovery> + <entry>2008-08-15</entry> + </dates> + </vuln> + <vuln vid="c61ca9cb-64c3-11dd-954d-006097bcc5f4"> <topic>openvpn-devel -- arbitrary code execution</topic> <affects> |