aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorSunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org>2020-05-13 20:44:17 +0000
committerSunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org>2020-05-13 20:44:17 +0000
commitb2cec66348c17a8c8ac3a57103f0c17a3fcd016d (patch)
tree3d9534263a0fd5916ab04496fec0a609a0108840 /security/vuxml
parenta24ec1f9ee8aa36d02aaf4c9b3a94ced28bdc343 (diff)
downloadports-b2cec66348c17a8c8ac3a57103f0c17a3fcd016d.tar.gz
ports-b2cec66348c17a8c8ac3a57103f0c17a3fcd016d.zip
Notes
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml102
1 files changed, 102 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c9f22ed3f5eb..9784df1e9b06 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,108 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="59fabdf2-9549-11ea-9448-08002728f74c">
+ <topic>typo3 -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>typo3-9-php72</name>
+ <name>typo3-9-php73</name>
+ <name>typo3-9-php74</name>
+ <range><lt>9.5.17</lt></range>
+ </package>
+ <package>
+ <name>typo3-10-php72</name>
+ <name>typo3-10-php73</name>
+ <name>typo3-10-php74</name>
+ <range><lt>10.4.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Typo3 News:</p>
+ <blockquote cite="https://typo3.org/article/typo3-1042-and-9517-security-releases-published">
+ <p>CVE-2020-11063: TYPO3-CORE-SA-2020-001: Information Disclosure in
+ Password Reset</p>
+ <p>It has been discovered that time-based attacks can be used with the
+ password reset functionality for backend users. This allows an attacker
+ to verify whether a backend user account with a given email address
+ exists or not.</p>
+ <p/>
+ <p>CVE-2020-11064: TYPO3-CORE-SA-2020-002: Cross-Site Scripting in Form
+ Engine</p>
+ <p>It has been discovered that HTML placeholder attributes containing
+ data of other database records are vulnerable to cross-site scripting. A
+ valid backend user account is needed to exploit this vulnerability.</p>
+ <p/>
+ <p>CVE-2020-11065: TYPO3-CORE-SA-2020-003: Cross-Site Scripting in Link
+ Handling</p>
+ <p>It has been discovered that link tags generated by typolink
+ functionality are vulnerable to cross-site scripting - properties being
+ assigned as HTML attributes have not been parsed correctly.</p>
+ <p/>
+ <p>CVE-2020-11066: TYPO3-CORE-SA-2020-004: Class destructors causing
+ side-effects when being unserialized</p>
+ <p>Calling unserialize() on malicious user-submitted content can result
+ in the following scenarios:</p>
+ <p>- trigger deletion of arbitrary directory in file system (if writable
+ for web server)</p>
+ <p>- trigger message submission via email using identity of web site
+ (mail relay)</p>
+ <p>Another insecure deserialization vulnerability is required to actually
+ exploit mentioned aspects.</p>
+ <p/>
+ <p>CVE-2020-11067: TYPO3-CORE-SA-2020-005: Insecure Deserialization in
+ Backend User Settings</p>
+ <p>It has been discovered that backend user settings (in $BE_USER-&gt;uc) are
+ vulnerable to insecure deserialization. In combination with
+ vulnerabilities of 3rd party components this can lead to remote code
+ execution. A valid backend user account is needed to exploit this
+ vulnerability.</p>
+ <p/>
+ <p>CVE-2020-11069: TYPO3-CORE-SA-2020-006: Same-Site Request Forgery to
+ Backend User Interface</p>
+ <p>It has been discovered that the backend user interface and install tool
+ are vulnerable to same-site request forgery. A backend user can be
+ tricked into interacting with a malicious resource an attacker
+ previously managed to upload to the web server - scripts are then
+ executed with the privileges of the victims’ user session.</p>
+ <p>In a worst case scenario new admin users can be created which can
+ directly be used by an attacker. The vulnerability is basically a
+ cross-site request forgery (CSRF) triggered by a cross-site scripting
+ vulnerability (XSS) - but happens on the same target host - thus, it’
+ actually a same-site request forgery (SSRF).</p>
+ <p>Malicious payload such as HTML containing JavaScript might be provided
+ by either an authenticated backend user or by a non-authenticated user
+ using a 3rd party extension - e.g. file upload in a contact form with
+ knowing the target location.</p>
+ <p>The attacked victim requires an active and valid backend or install
+ tool user session at the time of the attack to be successful.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://typo3.org/article/typo3-1042-and-9517-security-releases-published</url>
+ <url>https://get.typo3.org/release-notes/9.5.17</url>
+ <url>https://get.typo3.org/release-notes/10.4.2</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2020-001</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2020-002</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2020-003</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2020-004</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2020-005</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2020-006</url>
+ <cvename>CVE-2020-11063</cvename>
+ <cvename>CVE-2020-11064</cvename>
+ <cvename>CVE-2020-11065</cvename>
+ <cvename>CVE-2020-11066</cvename>
+ <cvename>CVE-2020-11067</cvename>
+ <cvename>CVE-2020-11069</cvename>
+ </references>
+ <dates>
+ <discovery>2020-05-12</discovery>
+ <entry>2020-05-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="0bfcae0b-947f-11ea-92ab-00163e433440">
<topic>FreeBSD -- Insufficient cryptodev MAC key length check</topic>
<affects>