Date: Thu, 6 Jun 2019 02:30:55 +0000 (UTC) From: Wen Heping <wen@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r503558 - head/security/vuxml Message-ID: <201906060230.x562UtBp036660@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: wen Date: Thu Jun 6 02:30:55 2019 New Revision: 503558 URL: https://svnweb.freebsd.org/changeset/ports/503558 Log: - Document Django vulnerabilities. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jun 6 01:24:32 2019 (r503557) +++ head/security/vuxml/vuln.xml Thu Jun 6 02:30:55 2019 (r503558) @@ -58,6 +58,54 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ffc73e87-87f0-11e9-ad56-fcaa147e860e"> + <topic>Django -- AdminURLFieldWidget XSS</topic> + <affects> + <package> + <name>py27-django111</name> + <name>py35-django111</name> + <name>py36-django111</name> + <name>py37-django111</name> + <range><lt>1.11.21</lt></range> + </package> + <package> + <name>py35-django21</name> + <name>py36-django21</name> + <name>py37-django21</name> + <range><lt>2.1.9</lt></range> + </package> + <package> + <name>py35-django22</name> + <name>py36-django22</name> + <name>py37-django22</name> + <range><lt>2.2.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Django security releases issued:</p> + <blockquote cite="https://www.djangoproject.com/weblog/2019/jun/03/security-releases/"> + <p>The clickable "Current URL" link generated by AdminURLFieldWidget displayed the + provided value without validating it as a safe URL. Thus, an unvalidated value stored + in the database, or a value provided as a URL query parameter payload, could result + in an clickable JavaScript link..</p> + <p>jQuery before 3.4.0, mishandles jQuery.extend(true, {}, ...) because of Object.prototype + pollution. If an unsanitized source object contained an enumerable __proto__ property, + it could extend the native Object.prototype.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2019-12308</cvename> + <cvename>CVE-2019-11358</cvename> + <url>https://www.djangoproject.com/weblog/2019/jun/03/security-releases/</url> + </references> + <dates> + <discovery>2019-06-03</discovery> + <entry>2019-06-06</entry> + </dates> + </vuln> + <vuln vid="4091069e-860b-11e9-a05f-001b217b3468"> <topic>Gitlab -- Multiple Vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201906060230.x562UtBp036660>