ports/151055: [MAINTAINER] [security] www/phpmyfaq: update to 2.6.9, fix XSS vulnerability

Florian Smeets flo at smeets.im
Wed Sep 29 07:40:05 UTC 2010


The following reply was made to PR ports/151055; it has been noted by GNATS.

From: Florian Smeets <flo at smeets.im>
To: bug-followup at FreeBSD.org
Cc:  
Subject: Re: ports/151055: [MAINTAINER] [security] www/phpmyfaq: update to
 2.6.9, fix XSS vulnerability
Date: Wed, 29 Sep 2010 09:36:16 +0200

 This is a multi-part message in MIME format.
 --------------060105080902070007030508
 Content-Type: text/plain; charset=ISO-8859-1; format=flowed
 Content-Transfer-Encoding: 7bit
 
 Here is the vuxml entry.
 
 --------------060105080902070007030508
 Content-Type: text/plain; x-mac-type="0"; x-mac-creator="0";
  name="vuxml.diff"
 Content-Transfer-Encoding: 7bit
 Content-Disposition: attachment;
  filename="vuxml.diff"
 
 --- vuln.xml.old	2010-09-29 09:06:01.000000000 +0200
 +++ vuln.xml	2010-09-29 09:21:18.000000000 +0200
 @@ -34,6 +34,36 @@
  
  -->
  <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
 +  <vuln vid="068732bb-cb98-11df-bc93-001c42d23634">
 +    <topic>phpmyfaq -- XSS vulnerabilities</topic>
 +    <affects>
 +      <package>
 +	<name>phpmyfaq</name>
 +	<range><ge>2.6.0</ge><lt>2.6.9</lt></range>
 +      </package>
 +    </affects>
 +    <description>
 +      <body xmlns="http://www.w3.org/1999/xhtml">
 +	<p>The phpMyFAQ project reports:</p>
 +	<blockquote cite="http://www.phpmyfaq.de/advisory_2010-09-28.php">
 +	  <p>The phpMyFAQ Team has learned of a security issue that has been 
 +	  discovered in phpMyFAQ 2.6.x</p>
 +	  <p>phpMyFAQ doesn't sanitize some variables in different pages
 +	  correctly. With a properly crafted URL it is e.g. possible to inject
 +	  JavaScript code into the output of a page, which could result in the
 +	  leakage of domain cookies (f.e. session identifiers).</p>
 +	</blockquote>
 +      </body>
 +    </description>
 +    <references>
 +    <url>http://www.phpmyfaq.de/advisory_2010-09-28.php</url>
 +    </references>
 +    <dates>
 +      <discovery>2010-09-28</discovery>
 +      <entry>2010-09-29</entry>
 +    </dates>
 +  </vuln>
 +
    <vuln vid="80b6d6cc-c970-11df-bb18-0015587e2cc1">
      <topic>openx -- remote code execution vulnerability</topic>
      <affects>
 
 --------------060105080902070007030508--



More information about the freebsd-ports-bugs mailing list