Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 19 Nov 2017 02:38:30 +0000 (UTC)
From:      Wen Heping <wen@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r454471 - head/security/vuxml
Message-ID:  <201711190238.vAJ2cUss070360@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: wen
Date: Sun Nov 19 02:38:29 2017
New Revision: 454471
URL: https://svnweb.freebsd.org/changeset/ports/454471

Log:
  - Document vulnerability in www/mediawiki127, www/mediawiki128 and www/mediawiki129.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sun Nov 19 01:06:20 2017	(r454470)
+++ head/security/vuxml/vuln.xml	Sun Nov 19 02:38:29 2017	(r454471)
@@ -58,6 +58,58 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="298829e2-ccce-11e7-92e4-000c29649f92">
+    <topic>mediawiki -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>mediawiki127</name>
+	<range><lt>1.27.3</lt></range>
+      </package>
+      <package>
+	<name>mediawiki128</name>
+	<range><lt>1.28.2</lt></range>
+      </package>
+      <package>
+	<name>mediawiki129</name>
+	<range><lt>1.29.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>mediawiki reports:</p>
+	<blockquote cite="https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html">;
+	  <p>security fixes:</p>
+	    <p>T128209: Reflected File Download from api.php. Reported by Abdullah Hussam.</p>
+	    <p>T165846: BotPasswords doesn't throttle login attempts.</p>
+	    <p>T134100: On private wikis, login form shouldn't distinguish between login failure due to bad username and bad password.</p>
+	    <p>T178451: XSS when $wgShowExceptionDetails = false and browser sends non-standard url escaping.</p>
+	    <p>T176247: It's possible to mangle HTML via raw message parameter expansion.</p>
+	    <p>T125163: id attribute on headlines allow raw.</p>
+	    <p>T124404: language converter can be tricked into replacing text inside tags by adding a lot of junk after the rule definition.</p>
+	    <p>T119158: Language converter: unsafe attribute injection via glossary rules.</p>
+	    <p>T180488: api.log contains passwords in plaintext wasn't correctly fixed.</p>
+	    <p>T180231: composer.json has require-dev versions of PHPUnit with known security issues. Reported by Tom Hutchison.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2017-8808</cvename>
+      <cvename>CVE-2017-8809</cvename>
+      <cvename>CVE-2017-8810</cvename>
+      <cvename>CVE-2017-8811</cvename>
+      <cvename>CVE-2017-8812</cvename>
+      <cvename>CVE-2017-8814</cvename>
+      <cvename>CVE-2017-8815</cvename>
+      <cvename>CVE-2017-0361</cvename>
+      <cvename>CVE-2017-9841</cvename>
+      <url>https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html</url>;
+    </references>
+    <dates>
+      <discovery>2017-11-14</discovery>
+      <entry>2017-11-19</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="52f10525-caff-11e7-b590-6451062f0f7a">
     <topic>Flash Player -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201711190238.vAJ2cUss070360>