aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMartin Wilke <miwi@FreeBSD.org>2008-08-18 22:57:28 +0000
committerMartin Wilke <miwi@FreeBSD.org>2008-08-18 22:57:28 +0000
commitd2c17f67f5e2ef10bf0ae53f01b226678663105b (patch)
tree4b2ac2629c49cef195042edfe59c4cba8213bbf9
parent654c61124f9440928fae3e0718e2c857c8e704fc (diff)
Notes
-rw-r--r--security/vuxml/vuln.xml29
1 files changed, 13 insertions, 16 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c46185e9f9bb..b24c0240ebd7 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -39,7 +39,7 @@ Note: Please add new entries to the beginning of this file.
<affects>
<package>
<name>drupal5</name>
- <range><lt>drupal5.10</lt></range>
+ <range><lt>5.10</lt></range>
</package>
<package>
<name>drupal6</name>
@@ -207,14 +207,11 @@ Note: Please add new entries to the beginning of this file.
option can be specified, pointing to the directory where
attachments to import are stored. If the XML file being
read by importxml.pl contains a malicious</p>
- <pre>../relative_path/to/local_file</pre>
- <p>node, the script follows this relative path and attaches the
+ <pre>../relative_path/to/local_file</pre>
+ <p>node, the script follows this relative path and attaches the
local file pointed by it to the bug, making the file public.
The security fix makes sure the relative path is always
ignored.</p>
- <p>Most Bugzilla installations will not be vulnerable, as
- they do not use --attach_path with importxml.pl.
- (In fact, most installations don't use importxml.pl at all.)</p>
</blockquote>
</body>
</description>
@@ -224,6 +221,7 @@ Note: Please add new entries to the beginning of this file.
<dates>
<discovery>2008-06-03</discovery>
<entry>2008-08-15</entry>
+ <modified>2008-08-19</modified>
</dates>
</vuln>
@@ -436,17 +434,16 @@ Note: Please add new entries to the beginning of this file.
<p>Pylons team reports:</p>
<blockquote cite="http://wiki.pylonshq.com/display/pylonsdocs/0.9.6.2">
<p>The error.py controller uses paste.fileapp to serve the static
- resources to the browser. The default error.py controller uses
- os.path.join to combine the id from Routes with the media path.
- Routes prior to 1.8 double unquoted the PATH_INFO, resulting in
- FileApp returning files from the filesystem that can be outside
- of the intended media path directory.
- </p>
+ resources to the browser. The default error.py controller uses
+ os.path.join to combine the id from Routes with the media path.
+ Routes prior to 1.8 double unquoted the PATH_INFO, resulting in
+ FileApp returning files from the filesystem that can be outside
+ of the intended media path directory.</p>
<p>An attacker can craft URL's which utilize the double escaping
- to pass in a name to the error.py controller which contains a
- leading slash thus escaping the intended media path and serving
- files from any location on the filesystem that the Pylons
- application has access to.</p>
+ to pass in a name to the error.py controller which contains a
+ leading slash thus escaping the intended media path and serving
+ files from any location on the filesystem that the Pylons
+ application has access to.</p>
</blockquote>
</body>
</description>