Date: Thu, 22 Dec 2016 03:21:59 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r429139 - head/security/vuxml Message-ID: <201612220321.uBM3Lxnv010575@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Thu Dec 22 03:21:59 2016 New Revision: 429139 URL: https://svnweb.freebsd.org/changeset/ports/429139 Log: Document Joomla! security advisories since 3.4.6 was released. While here, update entry for 3.4.6 with final advisory information from JSST page. A big thanks to Larry Rosenman for reporting the open issues and getting the port up to date. PR: 215058 Reported by: Larry Rosenman <ler@lerctr.org> Security: CVE-2016-8869 Security: CVE-2016-8870 Security: CVE-2016-9081 Security: CVE-2016-9836 Security: CVE-2016-9837 Security: CVE-2016-9838 Security: https://vuxml.FreeBSD.org/freebsd/624b45c0-c7f3-11e6-ae1b-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/a27d234a-c7f2-11e6-ae1b-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/c0ef061a-c7f0-11e6-ae1b-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/f0806cad-c7f1-11e6-ae1b-002590263bf5.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Dec 22 02:15:31 2016 (r429138) +++ head/security/vuxml/vuln.xml Thu Dec 22 03:21:59 2016 (r429139) @@ -58,6 +58,175 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">; + <vuln vid="624b45c0-c7f3-11e6-ae1b-002590263bf5"> + <topic>Joomla! -- multiple vulnerabilities</topic> + <affects> + <package> + <name>joomla3</name> + <range><ge>1.6.0</ge><lt>3.6.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml">; + <p>The JSST and the Joomla! Security Center report:</p> + <blockquote cite="https://developer.joomla.org/security-centre/664-20161201-core-elevated-privileges.html">; + <h2>[20161201] - Core - Elevated Privileges</h2> + <p>Incorrect use of unfiltered data stored to the session on a form + validation failure allows for existing user accounts to be modified; + to include resetting their username, password, and user group + assignments.</p> + </blockquote> + <blockquote cite="https://developer.joomla.org/security-centre/665-20161202-core-shell-upload.html">; + <h2>[20161202] - Core - Shell Upload</h2> + <p>Inadequate filesystem checks allowed files with alternative PHP + file extensions to be uploaded.</p> + </blockquote> + <blockquote cite="https://developer.joomla.org/security-centre/666-20161203-core-information-disclosure.html">; + <h2>[20161203] - Core - Information Disclosure</h2> + <p>Inadequate ACL checks in the Beez3 com_content article layout + override enables a user to view restricted content.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-9836</cvename> + <cvename>CVE-2016-9837</cvename> + <cvename>CVE-2016-9838</cvename> + <url>https://developer.joomla.org/security-centre/664-20161201-core-elevated-privileges.html</url>; + <url>https://developer.joomla.org/security-centre/665-20161202-core-shell-upload.html</url>; + <url>https://developer.joomla.org/security-centre/666-20161203-core-information-disclosure.html</url>; + <url>https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.html</url>; + </references> + <dates> + <discovery>2016-12-06</discovery> + <entry>2016-12-22</entry> + </dates> + </vuln> + + <vuln vid="a27d234a-c7f2-11e6-ae1b-002590263bf5"> + <topic>Joomla! -- multiple vulnerabilities</topic> + <affects> + <package> + <name>joomla3</name> + <range><ge>3.4.4</ge><lt>3.6.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml">; + <p>The JSST and the Joomla! Security Center report:</p> + <blockquote cite="https://developer.joomla.org/security-centre/659-20161001-core-account-creation.html">; + <h2>[20161001] - Core - Account Creation</h2> + <p>Inadequate checks allows for users to register on a site when + registration has been disabled.</p> + </blockquote> + <blockquote cite="https://developer.joomla.org/security-centre/660-20161002-core-elevated-privileges.html">; + <h2>[20161002] - Core - Elevated Privilege</h2> + <p>Incorrect use of unfiltered data allows for users to register on a + site with elevated privileges.</p> + </blockquote> + <blockquote cite="https://developer.joomla.org/security-centre/661-20161003-core-account-modifications.html">; + <h2>[20161003] - Core - Account Modifications</h2> + <p>Incorrect use of unfiltered data allows for existing user accounts + to be modified; to include resetting their username, password, and + user group assignments.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-8869</cvename> + <cvename>CVE-2016-8870</cvename> + <cvename>CVE-2016-9081</cvename> + <url>https://developer.joomla.org/security-centre/659-20161001-core-account-creation.html</url>; + <url>https://developer.joomla.org/security-centre/660-20161002-core-elevated-privileges.html</url>; + <url>https://developer.joomla.org/security-centre/661-20161003-core-account-modifications.html</url>; + <url>https://www.joomla.org/announcements/release-news/5678-joomla-3-6-4-released.html</url>; + </references> + <dates> + <discovery>2016-10-25</discovery> + <entry>2016-12-22</entry> + </dates> + </vuln> + + <vuln vid="f0806cad-c7f1-11e6-ae1b-002590263bf5"> + <topic>Joomla! -- multiple vulnerabilities</topic> + <affects> + <package> + <name>joomla3</name> + <range><ge>1.6.0</ge><lt>3.6.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml">; + <p>The JSST and the Joomla! Security Center report:</p> + <blockquote cite="https://developer.joomla.org/security-centre/652-20160801-core-core-acl-violations.html">; + <h2>[20160801] - Core - ACL Violation</h2> + <p>Inadequate ACL checks in com_content provide potential read access + to data which should be access restricted to users with edit_own + level.</p> + </blockquote> + <blockquote cite="https://developer.joomla.org/security-centre/653-20160802-core-xss-vulnerability.html">; + <h2>[20160802] - Core - XSS Vulnerability</h2> + <p>Inadequate escaping leads to XSS vulnerability in mail component. + </p> + </blockquote> + <blockquote cite="https://developer.joomla.org/security-centre/654-20160803-core-csrf.html">; + <h2>[20160803] - Core - CSRF</h2> + <p>Add additional CSRF hardening in com_joomlaupdate.</p> + </blockquote> + </body> + </description> + <references> + <url>https://developer.joomla.org/security-centre/652-20160801-core-core-acl-violations.html</url>; + <url>https://developer.joomla.org/security-centre/653-20160802-core-xss-vulnerability.html</url>; + <url>https://developer.joomla.org/security-centre/654-20160803-core-csrf.html</url>; + <url>https://www.joomla.org/announcements/release-news/5665-joomla-3-6-1-released.html</url>; + </references> + <dates> + <discovery>2016-08-03</discovery> + <entry>2016-12-22</entry> + </dates> + </vuln> + + <vuln vid="c0ef061a-c7f0-11e6-ae1b-002590263bf5"> + <topic>Joomla! -- multiple vulnerabilities</topic> + <affects> + <package> + <name>joomla3</name> + <range><ge>1.5.0</ge><lt>3.4.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml">; + <p>The JSST and the Joomla! Security Center report:</p> + <blockquote cite="https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html">; + <h2>[20151206] - Core - Session Hardening</h2> + <p>The Joomla Security Strike team has been following up on the + critical security vulnerability patched last week. Since the recent + update it has become clear that the root cause is a bug in PHP + itself. This was fixed by PHP in September of 2015 with the releases + of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all + versions of PHP 7 and has been back-ported in some specific Linux + LTS versions of PHP 5.3). This fixes the bug across all supported + PHP versions.</p> + </blockquote> + <blockquote cite="https://developer.joomla.org/security-centre/640-20151207-core-sql-injection.html">; + <h2>[20151207] - Core - SQL Injection</h2> + <p>Inadequate filtering of request data leads to a SQL Injection + vulnerability.</p> + </blockquote> + </body> + </description> + <references> + <url>https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html</url>; + <url>https://developer.joomla.org/security-centre/640-20151207-core-sql-injection.html</url>; + <url>https://www.joomla.org/announcements/release-news/5643-joomla-3-4-7.html</url>; + </references> + <dates> + <discovery>2015-12-21</discovery> + <entry>2016-12-22</entry> + </dates> + </vuln> + <vuln vid="3ae078ca-c7eb-11e6-ae1b-002590263bf5"> <topic>xen-kernel -- x86 PV guests may be able to mask interrupts</topic> <affects> @@ -21854,12 +22023,27 @@ and CVE-2013-0155.</p> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml">; - <p>Joomla! reports:</p> - <blockquote cite="https://www.joomla.org/announcements/release-news/5641-joomla-3-4-6-released.html">; - <p>Joomla! 3.4.6 is now available. This is a security release - for the 3.x series of Joomla which addresses a critical security - vulnerability and 4 low level security vulnerabilities. We strongly - recommend that you update your sites immediately.</p> + <p>The JSST and the Joomla! Security Center report:</p> + <blockquote cite="https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html">; + <h2>[20151201] - Core - Remote Code Execution Vulnerability</h2> + <p>Browser information is not filtered properly while saving the + session values into the database which leads to a Remote Code + Execution vulnerability.</p> + </blockquote> + <blockquote cite="https://developer.joomla.org/security-centre/633-20151214-core-csrf-hardening.html">; + <h2>[20151202] - Core - CSRF Hardening</h2> + <p>Add additional CSRF hardening in com_templates.</p> + </blockquote> + <blockquote cite="https://developer.joomla.org/security-centre/634-20151214-core-directory-traversal.html">; + <h2>[20151203] - Core - Directory Traversal</h2> + <p>Failure to properly sanitise input data from the XML install file + located within an extension's package archive allows for directory + traversal.</p> + </blockquote> + <blockquote cite="https://developer.joomla.org/security-centre/635-20151214-core-directory-traversal-2.html">; + <h2>[20151204] - Core - Directory Traversal</h2> + <p>Inadequate filtering of request data leads to a Directory Traversal + vulnerability.</p> </blockquote> </body> </description> @@ -21869,10 +22053,15 @@ and CVE-2013-0155.</p> <cvename>CVE-2015-8563</cvename> <cvename>CVE-2015-8564</cvename> <cvename>CVE-2015-8565</cvename> + <url>https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html</url>; + <url>https://developer.joomla.org/security-centre/633-20151214-core-csrf-hardening.html</url>; + <url>https://developer.joomla.org/security-centre/634-20151214-core-directory-traversal.html</url>; + <url>https://developer.joomla.org/security-centre/635-20151214-core-directory-traversal-2.html</url>; </references> <dates> <discovery>2015-12-14</discovery> <entry>2015-12-17</entry> + <modified>2016-12-22</modified> </dates> </vuln>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201612220321.uBM3Lxnv010575>