Date: Sun, 7 Dec 2008 15:38:00 +0900 (JST) From: Ayumi M <ayu@dahlia.commun.jp> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/129475: [vuxml] [MAINTAINER] www/habari: Message-ID: <20081207063800.B653062E3@dahlia.commun.jp> Resent-Message-ID: <200812070640.mB76e16H038358@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 129475 >Category: ports >Synopsis: [vuxml] [MAINTAINER] www/habari: >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Sun Dec 07 06:40:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Ayumi M >Release: FreeBSD 7.0-RELEASE-p5 i386 >Organization: >Environment: System: FreeBSD dahlia.commun.jp 7.0-RELEASE-p5 FreeBSD 7.0-RELEASE-p5 #0: Wed Oct 1 10:10:12 UTC 2008 root@i386-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC i386 >Description: VuXML update for CVE-2008-4601 criting from http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4601 -- Cross-site scripting (XSS) vulnerability in the login feature in Habari CMS 0.5.1 allows remote attackers to inject arbitrary web script or HTML via the habari_username parameter. -- >How-To-Repeat: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4601 http://secunia.com/advisories/32311/ >Fix: --- vuln-5e051e94-c35d-11dd-aff6-001b210f913f.xml begins here --- <vuln vid="5e051e94-c35d-11dd-aff6-001b210f913f"> <topic>habari -- Cross-site scripting</topic> <affects> <package> <name>habari</name> <range><lt>0.5.2</lt></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> <blockquote cite="http://secunia.com/advisories/32311/"> <p>swappie has discovered a vulnerability in Habari, which can be exploited by malicious people to conduct cross-site scripting attacks.</p> <p>Input passed via the "habari_username" parameter when logging in is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.</p> </blockquote> </body> </description> <references> <cvename>CVE-2008-4601</cvename> <url>http://secunia.com/advisories/32311/</url> <url>http://www.habariproject.org/en/habari-version-0-5-2</url> </references> <dates> <discovery>2008-10-15</discovery> </dates> </vuln> --- vuln-5e051e94-c35d-11dd-aff6-001b210f913f.xml ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20081207063800.B653062E3>