Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 22 Dec 2016 03:21:59 +0000 (UTC)
From:      Jason Unovitch <junovitch@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r429139 - head/security/vuxml
Message-ID:  <201612220321.uBM3Lxnv010575@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: junovitch
Date: Thu Dec 22 03:21:59 2016
New Revision: 429139
URL: https://svnweb.freebsd.org/changeset/ports/429139

Log:
  Document Joomla! security advisories since 3.4.6 was released.
  
  While here, update entry for 3.4.6 with final advisory information from
  JSST page.
  
  A big thanks to Larry Rosenman for reporting the open issues and getting the
  port up to date.
  
  PR:		215058
  Reported by:	Larry Rosenman <ler@lerctr.org>
  Security:	CVE-2016-8869
  Security:	CVE-2016-8870
  Security:	CVE-2016-9081
  Security:	CVE-2016-9836
  Security:	CVE-2016-9837
  Security:	CVE-2016-9838
  Security:	https://vuxml.FreeBSD.org/freebsd/624b45c0-c7f3-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/a27d234a-c7f2-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/c0ef061a-c7f0-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/f0806cad-c7f1-11e6-ae1b-002590263bf5.html

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Dec 22 02:15:31 2016	(r429138)
+++ head/security/vuxml/vuln.xml	Thu Dec 22 03:21:59 2016	(r429139)
@@ -58,6 +58,175 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="624b45c0-c7f3-11e6-ae1b-002590263bf5">
+    <topic>Joomla! -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>joomla3</name>
+	<range><ge>1.6.0</ge><lt>3.6.5</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The JSST and the Joomla! Security Center report:</p>
+	<blockquote cite="https://developer.joomla.org/security-centre/664-20161201-core-elevated-privileges.html">;
+	  <h2>[20161201] - Core - Elevated Privileges</h2>
+	  <p>Incorrect use of unfiltered data stored to the session on a form
+	    validation failure allows for existing user accounts to be modified;
+	    to include resetting their username, password, and user group
+	    assignments.</p>
+	</blockquote>
+	<blockquote cite="https://developer.joomla.org/security-centre/665-20161202-core-shell-upload.html">;
+	  <h2>[20161202] - Core - Shell Upload</h2>
+	  <p>Inadequate filesystem checks allowed files with alternative PHP
+	    file extensions to be uploaded.</p>
+	</blockquote>
+	<blockquote cite="https://developer.joomla.org/security-centre/666-20161203-core-information-disclosure.html">;
+	  <h2>[20161203] - Core - Information Disclosure</h2>
+	  <p>Inadequate ACL checks in the Beez3 com_content article layout
+	    override enables a user to view restricted content.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-9836</cvename>
+      <cvename>CVE-2016-9837</cvename>
+      <cvename>CVE-2016-9838</cvename>
+      <url>https://developer.joomla.org/security-centre/664-20161201-core-elevated-privileges.html</url>;
+      <url>https://developer.joomla.org/security-centre/665-20161202-core-shell-upload.html</url>;
+      <url>https://developer.joomla.org/security-centre/666-20161203-core-information-disclosure.html</url>;
+      <url>https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-12-06</discovery>
+      <entry>2016-12-22</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="a27d234a-c7f2-11e6-ae1b-002590263bf5">
+    <topic>Joomla! -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>joomla3</name>
+	<range><ge>3.4.4</ge><lt>3.6.4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The JSST and the Joomla! Security Center report:</p>
+	<blockquote cite="https://developer.joomla.org/security-centre/659-20161001-core-account-creation.html">;
+	  <h2>[20161001] - Core - Account Creation</h2>
+	  <p>Inadequate checks allows for users to register on a site when
+	    registration has been disabled.</p>
+	</blockquote>
+	<blockquote cite="https://developer.joomla.org/security-centre/660-20161002-core-elevated-privileges.html">;
+	  <h2>[20161002] - Core - Elevated Privilege</h2>
+	  <p>Incorrect use of unfiltered data allows for users to register on a
+	    site with elevated privileges.</p>
+	</blockquote>
+	<blockquote cite="https://developer.joomla.org/security-centre/661-20161003-core-account-modifications.html">;
+	  <h2>[20161003] - Core - Account Modifications</h2>
+	  <p>Incorrect use of unfiltered data allows for existing user accounts
+	    to be modified; to include resetting their username, password, and
+	    user group assignments.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-8869</cvename>
+      <cvename>CVE-2016-8870</cvename>
+      <cvename>CVE-2016-9081</cvename>
+      <url>https://developer.joomla.org/security-centre/659-20161001-core-account-creation.html</url>;
+      <url>https://developer.joomla.org/security-centre/660-20161002-core-elevated-privileges.html</url>;
+      <url>https://developer.joomla.org/security-centre/661-20161003-core-account-modifications.html</url>;
+      <url>https://www.joomla.org/announcements/release-news/5678-joomla-3-6-4-released.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-10-25</discovery>
+      <entry>2016-12-22</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="f0806cad-c7f1-11e6-ae1b-002590263bf5">
+    <topic>Joomla! -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>joomla3</name>
+	<range><ge>1.6.0</ge><lt>3.6.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The JSST and the Joomla! Security Center report:</p>
+	<blockquote cite="https://developer.joomla.org/security-centre/652-20160801-core-core-acl-violations.html">;
+	  <h2>[20160801] - Core - ACL Violation</h2>
+	  <p>Inadequate ACL checks in com_content provide potential read access
+	    to data which should be access restricted to users with edit_own
+	    level.</p>
+	</blockquote>
+	<blockquote cite="https://developer.joomla.org/security-centre/653-20160802-core-xss-vulnerability.html">;
+	  <h2>[20160802] - Core - XSS Vulnerability</h2>
+	  <p>Inadequate escaping leads to XSS vulnerability in mail component.
+	    </p>
+	</blockquote>
+	<blockquote cite="https://developer.joomla.org/security-centre/654-20160803-core-csrf.html">;
+	  <h2>[20160803] - Core - CSRF</h2>
+	  <p>Add additional CSRF hardening in com_joomlaupdate.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://developer.joomla.org/security-centre/652-20160801-core-core-acl-violations.html</url>;
+      <url>https://developer.joomla.org/security-centre/653-20160802-core-xss-vulnerability.html</url>;
+      <url>https://developer.joomla.org/security-centre/654-20160803-core-csrf.html</url>;
+      <url>https://www.joomla.org/announcements/release-news/5665-joomla-3-6-1-released.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-08-03</discovery>
+      <entry>2016-12-22</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="c0ef061a-c7f0-11e6-ae1b-002590263bf5">
+    <topic>Joomla! -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>joomla3</name>
+	<range><ge>1.5.0</ge><lt>3.4.7</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The JSST and the Joomla! Security Center report:</p>
+	<blockquote cite="https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html">;
+	  <h2>[20151206] - Core - Session Hardening</h2>
+	  <p>The Joomla Security Strike team has been following up on the
+	    critical security vulnerability patched last week. Since the recent
+	    update it has become clear that the root cause is a bug in PHP
+	    itself. This was fixed by PHP in September of 2015 with the releases
+	    of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all
+	    versions of PHP 7 and has been back-ported in some specific Linux
+	    LTS versions of PHP 5.3). This fixes the bug across all supported
+	    PHP versions.</p>
+	</blockquote>
+	<blockquote cite="https://developer.joomla.org/security-centre/640-20151207-core-sql-injection.html">;
+	  <h2>[20151207] - Core - SQL Injection</h2>
+	  <p>Inadequate filtering of request data leads to a SQL Injection
+	    vulnerability.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html</url>;
+      <url>https://developer.joomla.org/security-centre/640-20151207-core-sql-injection.html</url>;
+      <url>https://www.joomla.org/announcements/release-news/5643-joomla-3-4-7.html</url>;
+    </references>
+    <dates>
+      <discovery>2015-12-21</discovery>
+      <entry>2016-12-22</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="3ae078ca-c7eb-11e6-ae1b-002590263bf5">
     <topic>xen-kernel -- x86 PV guests may be able to mask interrupts</topic>
     <affects>
@@ -21854,12 +22023,27 @@ and CVE-2013-0155.</p>
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>Joomla! reports:</p>
-	<blockquote cite="https://www.joomla.org/announcements/release-news/5641-joomla-3-4-6-released.html">;
-	  <p>Joomla! 3.4.6 is now available. This is a security release
-	    for the 3.x series of Joomla which addresses a critical security
-	    vulnerability and 4 low level security vulnerabilities. We strongly
-	    recommend that you update your sites immediately.</p>
+	<p>The JSST and the Joomla! Security Center report:</p>
+	<blockquote cite="https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html">;
+	  <h2>[20151201] - Core - Remote Code Execution Vulnerability</h2>
+	  <p>Browser information is not filtered properly while saving the
+	    session values into the database which leads to a Remote Code
+	    Execution vulnerability.</p>
+	</blockquote>
+	<blockquote cite="https://developer.joomla.org/security-centre/633-20151214-core-csrf-hardening.html">;
+	  <h2>[20151202] - Core - CSRF Hardening</h2>
+	  <p>Add additional CSRF hardening in com_templates.</p>
+	</blockquote>
+	<blockquote cite="https://developer.joomla.org/security-centre/634-20151214-core-directory-traversal.html">;
+	  <h2>[20151203] - Core - Directory Traversal</h2>
+	  <p>Failure to properly sanitise input data from the XML install file
+	    located within an extension's package archive allows for directory
+	    traversal.</p>
+	</blockquote>
+	<blockquote cite="https://developer.joomla.org/security-centre/635-20151214-core-directory-traversal-2.html">;
+	  <h2>[20151204] - Core - Directory Traversal</h2>
+	  <p>Inadequate filtering of request data leads to a Directory Traversal
+	    vulnerability.</p>
 	</blockquote>
       </body>
     </description>
@@ -21869,10 +22053,15 @@ and CVE-2013-0155.</p>
       <cvename>CVE-2015-8563</cvename>
       <cvename>CVE-2015-8564</cvename>
       <cvename>CVE-2015-8565</cvename>
+      <url>https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html</url>;
+      <url>https://developer.joomla.org/security-centre/633-20151214-core-csrf-hardening.html</url>;
+      <url>https://developer.joomla.org/security-centre/634-20151214-core-directory-traversal.html</url>;
+      <url>https://developer.joomla.org/security-centre/635-20151214-core-directory-traversal-2.html</url>;
     </references>
     <dates>
       <discovery>2015-12-14</discovery>
       <entry>2015-12-17</entry>
+      <modified>2016-12-22</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201612220321.uBM3Lxnv010575>