diff options
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 51f2e10ac207..dea278e87ed0 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -52,6 +52,43 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="495b46fd-a30f-11e1-82c9-d0df9acfd7e5"> + <topic>foswiki -- Script Insertion Vulnerability via unchecked user registration fields</topic> + <affects> + <package> + <name>foswiki</name> + <range><lt>1.1.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Foswiki team reports:</p> + <blockquote cite="http://foswiki.org/Support/SecurityAlert-CVE-2012-1004"> + <p>When a new user registers, the new user can add arbitrary HTML and + script code into the user topic which is generated by the + RegistrationAgent via standard registration fields such as + "FirstName" or "OrganisationName".</p> + <p>By design, Foswiki's normal editing features allow arbitrary HTML + markup, including script code, to be inserted into any topic anyway, + assuming the authenticated user has CHANGE permission - which is the + case on many Foswiki sites. However, the assumption that only + authenticated users with CHANGE permission may create script content + is false if new users exploit the vulnerability detailed in this + alert to manipulate the registration agent into creating that + content for them.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-1004</cvename> + <url>http://foswiki.org/Support/SecurityAlert-CVE-2012-1004</url> + </references> + <dates> + <discovery>2012-04-13</discovery> + <entry>2012-05-21</entry> + </dates> + </vuln> + <vuln vid="b8ae4659-a0da-11e1-a294-bcaec565249c"> <topic>libxml2 -- An off-by-one out-of-bounds write by XPointer</topic> <affects> |