Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Feb 2016 15:36:20 +0000 (UTC)
From:      Mark Felder <feld@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r409527 - head/security/vuxml
Message-ID:  <201602251536.u1PFaKtr084654@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: feld
Date: Thu Feb 25 15:36:20 2016
New Revision: 409527
URL: https://svnweb.freebsd.org/changeset/ports/409527

Log:
  Document drupal vulnerabilities
  
  PR:		207467
  Security:	https://www.drupal.org/SA-CORE-2016-001

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Feb 25 15:27:43 2016	(r409526)
+++ head/security/vuxml/vuln.xml	Thu Feb 25 15:36:20 2016	(r409527)
@@ -58,6 +58,60 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="59a0af97-dbd4-11e5-8fa8-14dae9d210b8">
+    <topic>drupal -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>drupal6</name>
+	<range><lt>6.38</lt></range>
+      </package>
+      <package>
+	<name>drupal7</name>
+	<range><lt>7.43</lt></range>
+      </package>
+      <package>
+	<name>drupal8</name>
+	<range><lt>8.0.4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Drupal Security Team reports:</p>
+	<blockquote cite="https://www.drupal.org/SA-CORE-2016-001">;
+	  <ul>
+	  <li><p>File upload access bypass and denial of service (File
+	    module - Drupal 7 and 8 - Moderately Critical)</p></li>
+	  <li><p>Brute force amplification attacks via XML-RPC (XML-RPC
+	    server - Drupal 6 and 7 - Moderately Critical)</p></li>
+	  <li><p>Open redirect via path manipulation (Base system -
+	    Drupal 6, 7 and 8 - Moderately Critical) </p></li>
+	  <li><p>Form API ignores access restrictions on submit buttons
+	    (Form API - Drupal 6 - Critical)</p></li>
+	  <li><p>HTTP header injection using line breaks (Base system -
+	    Drupal 6 - Moderately Critical)</p></li>
+	  <li><p>Open redirect via double-encoded 'destination'
+	    parameter (Base system - Drupal 6 - Moderately Critical)</p></li>
+	  <li><p>Reflected file download vulnerability (System module -
+	    Drupal 6 and 7 - Moderately Critical)</p></li>
+	  <li><p>Saving user accounts can sometimes grant the user all
+	    roles (User module - Drupal 6 and 7 - Less Critical)</p></li>
+	  <li><p>Email address can be matched to an account (User module
+	    - Drupal 7 and 8 - Less Critical)</p></li>
+	  <li><p>Session data truncation can lead to unserialization of
+	    user provided data (Base system - Drupal 6 - Less Critical)</p></li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://www.drupal.org/SA-CORE-2016-001</url>;
+    </references>
+    <dates>
+      <discovery>2016-02-24</discovery>
+      <entry>2016-02-25</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="7e01df39-db7e-11e5-b937-00e0814cab4e">
     <topic>jenkins -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201602251536.u1PFaKtr084654>