Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 May 2013 03:08:37 -0400 (EDT)
From:      Garrett Wollman <wollman@bimajority.org>
To:        FreeBSD-gnats-submit@freebsd.org
Subject:   ports/178985: security/vuxml update for couchdb CVE-2012-5650
Message-ID:  <201305260708.r4Q78bql022317@hergotha.csail.mit.edu>
Resent-Message-ID: <201305260710.r4Q7A0v5080166@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         178985
>Category:       ports
>Synopsis:       security/vuxml update for couchdb CVE-2012-5650
>Confidential:   no
>Severity:       serious
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Sun May 26 07:10:00 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator:     Garrett Wollman
>Release:        FreeBSD 9.1-RELEASE-p3 amd64
>Organization:
>Environment:
System: FreeBSD hergotha.csail.mit.edu 9.1-RELEASE-p3 FreeBSD 9.1-RELEASE-p3 #6 r250951: Thu May 23 23:38:53 EDT 2013 wollman@hergotha.csail.mit.edu:/usr/obj/usr/src/sys/HERGOTHA amd64

>Description:

CouchDB had three advisories back in January which affect the current
databases/couchdb port (see PR ports/178331).  Two of those advisories
do not appear to affect FreeBSD users, but the third one affects all
users including FreeBSD, so deserves listing in vuln.xml.

Note that someone needs to poke the CouchDB developers to complete
their CVE reports for these vulnerabilities, which are still not
published in the CVE repository.

>How-To-Repeat:

Read CHANGES file in couchdb's git repository.

>Fix:

Index: vuln.xml
===================================================================
--- vuln.xml	(revision 319091)
+++ vuln.xml	(working copy)
@@ -51,6 +51,35 @@
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="4fb45a1c-c5d0-11e2-8400-001b216147b0">
+    <topic>couchdb -- DOM based Cross-Site Scripting via Futon UI</topic>
+    <affects>
+      <package>
+	<name>couchdb</name>
+	<range><lt>1.2.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Jan Lehnardt reports:</p>
+	<blockquote cite="http://mail-archives.apache.org/mod_mbox/couchdb-user/201301.mbox/%3C2FFF2FD7-8EAF-4EBF-AFDA-5AEB6EAC853F@apache.org%3E">;
+	  <p>Query parameters passed into the browser-based test suite
+are not sanitised, and can be used to load external resources. An
+attacker may execute JavaScript code in the browser, using the context
+of the remote user.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2012-5650</cvename>
+      <url>http://mail-archives.apache.org/mod_mbox/couchdb-user/201301.mbox/%3C2FFF2FD7-8EAF-4EBF-AFDA-5AEB6EAC853F@apache.org%3E</url>;
+    </references>
+    <dates>
+      <discovery>2012-01-14</discovery>
+      <entry>2013-05-26</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="a5b24a6b-c37c-11e2-addb-60a44c524f57">
     <topic>otrs -- information disclosure</topic>
     <affects>



>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201305260708.r4Q78bql022317>