aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorWen Heping <wen@FreeBSD.org>2012-09-01 12:44:33 +0000
committerWen Heping <wen@FreeBSD.org>2012-09-01 12:44:33 +0000
commit3ca103d2386a28b09fe4be2b767e243c9796ed10 (patch)
tree0aa00a3cc8ca4738fd6f440595e9253b17401a32 /security/vuxml
parentc2ff523da622b37856bdd24ff2e1fde5344fe2df (diff)
downloadports-3ca103d2386a28b09fe4be2b767e243c9796ed10.tar.gz
ports-3ca103d2386a28b09fe4be2b767e243c9796ed10.zip
Notes
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml67
1 files changed, 67 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 456fbf55d110..359a5e6e336e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,73 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="7c0fecd6-f42f-11e1-b17b-000c2977ec30">
+ <topic>mediawiki -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mediawiki</name>
+ <range><lt>1.19.2</lt></range>
+ </package>
+ <package>
+ <name>mediawiki118</name>
+ <range><lt>1.18.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mediawiki reports:</p>
+ <blockquote cite="http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html">
+ <p>(Bug 39700) Wikipedia administrator Writ Keeper discovered
+ a stored XSS (HTML injection) vulnerability. This was
+ possible due to the handling of link text on File: links for
+ nonexistent files. MediaWiki 1.16 and later is affected.</p>
+ <p>(Bug 39180) User Fomafix reported several DOM-based XSS
+ vulnerabilities, made possible by a combination of loose
+ filtering of the uselang parameter, and JavaScript gadgets
+ on various language Wikipedias.</p>
+ <p>(Bug 39180) During internal review, it was discovered that
+ CSRF tokens, available via the api, were not protected with
+ X-Frame-Options headers. This could lead to a CSRF vulnerability
+ if the API response is embedded in an external website using
+ using an iframe.</p>
+ <p>(Bug 39824) During internal review, it was discovered extensions
+ were not always allowed to prevent the account creation action.
+ This allowed users blocked by the GlobalBlocking extension to
+ create accounts.</p>
+ <p>(Bug 39184) During internal review, it was discovered that
+ password data was always saved to the local MediaWiki database
+ even if authentication was handled by an extension, such as LDAP.
+ This could allow a compromised MediaWiki installation to leak
+ information about user's LDAP passwords. Additionally, in situations
+ when an authentication plugin returned false in its strict
+ function, this would allow old passwords to be used for accounts
+ that did not exist in the external system, indefinitely.</p>
+ <p>(Bug 39823) During internal review, it was discovered that metadata
+ about blocks, hidden by a user with suppression rights, was visible
+ to administrators.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://bugzilla.wikimedia.org/show_bug.cgi?id=39700</url>
+ <url>https://bugzilla.wikimedia.org/show_bug.cgi?id=37587</url>
+ <url>https://bugzilla.wikimedia.org/show_bug.cgi?id=39180</url>
+ <url>https://bugzilla.wikimedia.org/show_bug.cgi?id=39824</url>
+ <url>https://bugzilla.wikimedia.org/show_bug.cgi?id=39184</url>
+ <url>https://bugzilla.wikimedia.org/show_bug.cgi?id=39823</url>
+ <cvename>CVE-2012-4377</cvename>
+ <cvename>CVE-2012-4378</cvename>
+ <cvename>CVE-2012-4379</cvename>
+ <cvename>CVE-2012-4380</cvename>
+ <cvename>CVE-2012-4381</cvename>
+ <cvename>CVE-2012-4382</cvename>
+ </references>
+ <dates>
+ <discovery>2012-08-27</discovery>
+ <entry>2012-09-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="5415f1b3-f33d-11e1-8bd8-0022156e8794">
<topic>wireshark -- denial of service in DRDA dissector</topic>
<affects>