svn commit: r310013 - head/security/vuxml

Eygene Ryabinkin rea at FreeBSD.org
Sun Jan 6 20:37:25 UTC 2013


Author: rea
Date: Sun Jan  6 20:37:24 2013
New Revision: 310013
URL: http://svnweb.freebsd.org/changeset/ports/310013

Log:
  VuXML: extend entry for MoinMoin vulnerabilities fixed in 1.9.6
  
  Use more verbose descriptions from CVE entries and trim citation
  from CHANGES to the relevant parts.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sun Jan  6 19:56:54 2013	(r310012)
+++ head/security/vuxml/vuln.xml	Sun Jan  6 20:37:24 2013	(r310013)
@@ -161,21 +161,40 @@ Note:  Please add new entries to the beg
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">
-	<p>Thomas Waldmann reports:</p>
+	<p>MoinMoin developers report the following vulnerabilities
+	  as fixed in version 1.9.6:</p>
 	<blockquote cite="http://hg.moinmo.in/moin/1.9/raw-file/1.9.6/docs/CHANGES">
-	  <p>SECURITY HINT: make sure you have allow_xslt = False (or just do
-	    not use allow_xslt at all in your wiki configs, False is the
-	    internal default).  Allowing XSLT/4suite is very dangerous, see
-	    HelpOnConfiguration wiki page.</p>
-
-	  <p>Fixes:</p>
 	  <ul>
-	  <li>fix remote code execution vulnerability in
-	    twikidraw/anywikidraw action</li>
-	    <li>fix path traversal vulnerability in AttachFile action</li>
-	    <li>fix XSS issue, escape page name in rss link.</li>
+	    <li>remote code execution vulnerability in
+	      twikidraw/anywikidraw action,</li>
+	    <li>path traversal vulnerability in AttachFile action,</li>
+	    <li>XSS issue, escape page name in rss link.</li>
 	  </ul>
 	</blockquote>
+	<p>CVE entries at MITRE furher clarify:</p>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-6081">
+	  <p>Multiple unrestricted file upload vulnerabilities in the
+	    (1) twikidraw (action/twikidraw.py) and (2) anywikidraw
+	    (action/anywikidraw.py) actions in MoinMoin before 1.9.6
+	    allow remote authenticated users with write permissions to
+	    execute arbitrary code by uploading a file with an
+	    executable extension, then accessing it via a direct request
+	    to the file in an unspecified directory, as exploited in the
+	    wild in July 2012.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-6080">
+	  <p>Directory traversal vulnerability in the
+	    _do_attachment_move function in the AttachFile action
+	    (action/AttachFile.py) in MoinMoin 1.9.3 through 1.9.5
+	    allows remote attackers to overwrite arbitrary files via a
+	    .. (dot dot) in a file name.</p>
+	</blockquote>
+	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-6082">
+	  <p>Cross-site scripting (XSS) vulnerability in the rsslink
+	    function in theme/__init__.py in MoinMoin 1.9.5 allows
+	    remote attackers to inject arbitrary web script or HTML
+	    via the page name in a rss link.</p>
+	</blockquote>
       </body>
     </description>
     <references>


More information about the svn-ports-all mailing list