Date: Sat, 12 May 2012 18:41:02 +0900 (JST) From: Fumiyuki Shimizu <fumifumi@abacustech.jp> To: FreeBSD-gnats-submit@FreeBSD.org Cc: secteam@FreeBSD.org Subject: ports/167819: [PATCH] security/vuxml: www/pivotx -- 'ajaxhelper.php' Cross Site Scripting Vulnerability Message-ID: <20120512094102.532A9B242A@bourgogne.abacustech.jp> Resent-Message-ID: <201205120950.q4C9o7jp097986@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 167819 >Category: ports >Synopsis: [PATCH] security/vuxml: www/pivotx -- 'ajaxhelper.php' Cross Site Scripting Vulnerability >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sat May 12 09:50:07 UTC 2012 >Closed-Date: >Last-Modified: >Originator: Fumiyuki Shimizu >Release: FreeBSD 8.1-RELEASE-p5 amd64 >Organization: Abacus Technologies, Inc. >Environment: System: FreeBSD 8.1-RELEASE-p5 #0: Tue Sep 27 16:49:00 UTC 2011 >Description: XSS vulnerability was found in PivotX <= 2.3.2 >How-To-Repeat: >Fix: --- vuxml-1.1_1.patch begins here --- diff -ruN --exclude=CVS /usr/ports/security/vuxml/vuln.xml ./vuln.xml --- /usr/ports/security/vuxml/vuln.xml 2012-05-11 17:53:19.000000000 +0900 +++ ./vuln.xml 2012-05-12 15:17:09.000000000 +0900 @@ -52,6 +52,36 @@ --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="0d3547ab-9b69-11e1-bdb1-525401003090"> + <topic>PivotX -- 'ajaxhelper.php' Cross Site Scripting Vulnerability</topic> + <affects> + <package> + <name>pivotx</name> + <range><le>2.3.2</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>High-Tech Bridge reports:</p> + <blockquote cite="https://www.htbridge.com/advisory/HTB23087"> + <p>Input passed via the "file" GET parameter to + /pivotx/ajaxhelper.php is not properly sanitised before + being returned to the user. This can be exploited to + execute arbitrary HTML and script code in administrator's + browser session in context of the affected website.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-2274</cvename> + <bid>52159</bid> + </references> + <dates> + <discovery>2012-05-09</discovery> + <entry>2012-05-12</entry> + </dates> + </vuln> + <vuln vid="b91234e7-9a8b-11e1-b666-001636d274f3"> <topic>NVIDIA UNIX driver -- access to arbitrary system memory</topic> <affects> --- vuxml-1.1_1.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20120512094102.532A9B242A>