From owner-svn-ports-all@freebsd.org Thu Dec 22 03:22:00 2016 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 85111C895BC; Thu, 22 Dec 2016 03:22:00 +0000 (UTC) (envelope-from junovitch@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5FC49197E; Thu, 22 Dec 2016 03:22:00 +0000 (UTC) (envelope-from junovitch@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uBM3Lxw3010577; Thu, 22 Dec 2016 03:21:59 GMT (envelope-from junovitch@FreeBSD.org) Received: (from junovitch@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id uBM3Lxnv010575; Thu, 22 Dec 2016 03:21:59 GMT (envelope-from junovitch@FreeBSD.org) Message-Id: <201612220321.uBM3Lxnv010575@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: junovitch set sender to junovitch@FreeBSD.org using -f From: Jason Unovitch Date: Thu, 22 Dec 2016 03:21:59 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r429139 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Dec 2016 03:22:00 -0000 Author: junovitch Date: Thu Dec 22 03:21:59 2016 New Revision: 429139 URL: https://svnweb.freebsd.org/changeset/ports/429139 Log: Document Joomla! security advisories since 3.4.6 was released. While here, update entry for 3.4.6 with final advisory information from JSST page. A big thanks to Larry Rosenman for reporting the open issues and getting the port up to date. PR: 215058 Reported by: Larry Rosenman Security: CVE-2016-8869 Security: CVE-2016-8870 Security: CVE-2016-9081 Security: CVE-2016-9836 Security: CVE-2016-9837 Security: CVE-2016-9838 Security: https://vuxml.FreeBSD.org/freebsd/624b45c0-c7f3-11e6-ae1b-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/a27d234a-c7f2-11e6-ae1b-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/c0ef061a-c7f0-11e6-ae1b-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/f0806cad-c7f1-11e6-ae1b-002590263bf5.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Dec 22 02:15:31 2016 (r429138) +++ head/security/vuxml/vuln.xml Thu Dec 22 03:21:59 2016 (r429139) @@ -58,6 +58,175 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + Joomla! -- multiple vulnerabilities + + + joomla3 + 1.6.03.6.5 + + + + +

The JSST and the Joomla! Security Center report:

+
+

[20161201] - Core - Elevated Privileges

+

Incorrect use of unfiltered data stored to the session on a form + validation failure allows for existing user accounts to be modified; + to include resetting their username, password, and user group + assignments.

+
+
+

[20161202] - Core - Shell Upload

+

Inadequate filesystem checks allowed files with alternative PHP + file extensions to be uploaded.

+
+
+

[20161203] - Core - Information Disclosure

+

Inadequate ACL checks in the Beez3 com_content article layout + override enables a user to view restricted content.

+
+ +
+ + CVE-2016-9836 + CVE-2016-9837 + CVE-2016-9838 + https://developer.joomla.org/security-centre/664-20161201-core-elevated-privileges.html + https://developer.joomla.org/security-centre/665-20161202-core-shell-upload.html + https://developer.joomla.org/security-centre/666-20161203-core-information-disclosure.html + https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.html + + + 2016-12-06 + 2016-12-22 + +
+ + + Joomla! -- multiple vulnerabilities + + + joomla3 + 3.4.43.6.4 + + + + +

The JSST and the Joomla! Security Center report:

+
+

[20161001] - Core - Account Creation

+

Inadequate checks allows for users to register on a site when + registration has been disabled.

+
+
+

[20161002] - Core - Elevated Privilege

+

Incorrect use of unfiltered data allows for users to register on a + site with elevated privileges.

+
+
+

[20161003] - Core - Account Modifications

+

Incorrect use of unfiltered data allows for existing user accounts + to be modified; to include resetting their username, password, and + user group assignments.

+
+ +
+ + CVE-2016-8869 + CVE-2016-8870 + CVE-2016-9081 + https://developer.joomla.org/security-centre/659-20161001-core-account-creation.html + https://developer.joomla.org/security-centre/660-20161002-core-elevated-privileges.html + https://developer.joomla.org/security-centre/661-20161003-core-account-modifications.html + https://www.joomla.org/announcements/release-news/5678-joomla-3-6-4-released.html + + + 2016-10-25 + 2016-12-22 + +
+ + + Joomla! -- multiple vulnerabilities + + + joomla3 + 1.6.03.6.1 + + + + +

The JSST and the Joomla! Security Center report:

+
+

[20160801] - Core - ACL Violation

+

Inadequate ACL checks in com_content provide potential read access + to data which should be access restricted to users with edit_own + level.

+
+
+

[20160802] - Core - XSS Vulnerability

+

Inadequate escaping leads to XSS vulnerability in mail component. +

+
+
+

[20160803] - Core - CSRF

+

Add additional CSRF hardening in com_joomlaupdate.

+
+ +
+ + https://developer.joomla.org/security-centre/652-20160801-core-core-acl-violations.html + https://developer.joomla.org/security-centre/653-20160802-core-xss-vulnerability.html + https://developer.joomla.org/security-centre/654-20160803-core-csrf.html + https://www.joomla.org/announcements/release-news/5665-joomla-3-6-1-released.html + + + 2016-08-03 + 2016-12-22 + +
+ + + Joomla! -- multiple vulnerabilities + + + joomla3 + 1.5.03.4.7 + + + + +

The JSST and the Joomla! Security Center report:

+
+

[20151206] - Core - Session Hardening

+

The Joomla Security Strike team has been following up on the + critical security vulnerability patched last week. Since the recent + update it has become clear that the root cause is a bug in PHP + itself. This was fixed by PHP in September of 2015 with the releases + of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all + versions of PHP 7 and has been back-ported in some specific Linux + LTS versions of PHP 5.3). This fixes the bug across all supported + PHP versions.

+
+
+

[20151207] - Core - SQL Injection

+

Inadequate filtering of request data leads to a SQL Injection + vulnerability.

+
+ +
+ + https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html + https://developer.joomla.org/security-centre/640-20151207-core-sql-injection.html + https://www.joomla.org/announcements/release-news/5643-joomla-3-4-7.html + + + 2015-12-21 + 2016-12-22 + +
+ xen-kernel -- x86 PV guests may be able to mask interrupts @@ -21854,12 +22023,27 @@ and CVE-2013-0155.

-

Joomla! reports:

-
-

Joomla! 3.4.6 is now available. This is a security release - for the 3.x series of Joomla which addresses a critical security - vulnerability and 4 low level security vulnerabilities. We strongly - recommend that you update your sites immediately.

+

The JSST and the Joomla! Security Center report:

+
+

[20151201] - Core - Remote Code Execution Vulnerability

+

Browser information is not filtered properly while saving the + session values into the database which leads to a Remote Code + Execution vulnerability.

+
+
+

[20151202] - Core - CSRF Hardening

+

Add additional CSRF hardening in com_templates.

+
+
+

[20151203] - Core - Directory Traversal

+

Failure to properly sanitise input data from the XML install file + located within an extension's package archive allows for directory + traversal.

+
+
+

[20151204] - Core - Directory Traversal

+

Inadequate filtering of request data leads to a Directory Traversal + vulnerability.

@@ -21869,10 +22053,15 @@ and CVE-2013-0155.

CVE-2015-8563 CVE-2015-8564 CVE-2015-8565 + https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html + https://developer.joomla.org/security-centre/633-20151214-core-csrf-hardening.html + https://developer.joomla.org/security-centre/634-20151214-core-directory-traversal.html + https://developer.joomla.org/security-centre/635-20151214-core-directory-traversal-2.html 2015-12-14 2015-12-17 + 2016-12-22