aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml37
1 files changed, 37 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 51f2e10ac207..dea278e87ed0 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -52,6 +52,43 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="495b46fd-a30f-11e1-82c9-d0df9acfd7e5">
+ <topic>foswiki -- Script Insertion Vulnerability via unchecked user registration fields</topic>
+ <affects>
+ <package>
+ <name>foswiki</name>
+ <range><lt>1.1.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Foswiki team reports:</p>
+ <blockquote cite="http://foswiki.org/Support/SecurityAlert-CVE-2012-1004">
+ <p>When a new user registers, the new user can add arbitrary HTML and
+ script code into the user topic which is generated by the
+ RegistrationAgent via standard registration fields such as
+ "FirstName" or "OrganisationName".</p>
+ <p>By design, Foswiki's normal editing features allow arbitrary HTML
+ markup, including script code, to be inserted into any topic anyway,
+ assuming the authenticated user has CHANGE permission - which is the
+ case on many Foswiki sites. However, the assumption that only
+ authenticated users with CHANGE permission may create script content
+ is false if new users exploit the vulnerability detailed in this
+ alert to manipulate the registration agent into creating that
+ content for them.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-1004</cvename>
+ <url>http://foswiki.org/Support/SecurityAlert-CVE-2012-1004</url>
+ </references>
+ <dates>
+ <discovery>2012-04-13</discovery>
+ <entry>2012-05-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b8ae4659-a0da-11e1-a294-bcaec565249c">
<topic>libxml2 -- An off-by-one out-of-bounds write by XPointer</topic>
<affects>