From nobody Mon May 8 13:07:53 2023 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QFM6160rzz49tkB; Mon, 8 May 2023 13:07:53 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QFM615VKVz4GhY; Mon, 8 May 2023 13:07:53 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1683551273; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Y6lNVpaJnRA5vbfpuPG6bwOrY+0T2UYLTmgFR8i/UTI=; b=nN57YOhl+03IpINvZci62yS3LVHw25fcKQhiuFLC9Ju6u4qvdtSS0LwX5iSEZAih9l8DJN m9lq8wGg0/U+OZFq7roLF7132kD3A5SCUS8Fuovh+oK0zj9XH7c05zIAbfk6CaqZMruRF9 EVL2G3MgZHnHr1704fGSxWawm0OqMCScHJIXNyoWeBNB9+bCdngL5hKtO8vlzeuX7x3qK+ ut37ifjv1og0TDQB8YZEVGS12KpUMuDCjZJG0OXCqzX7U+zWadVWUFwm2xtP6I1kIz3FYz bOGssHcL2hn32Prp7G8XS8Zje9C9443TVvkYX3uEUlYakQb90axoLtRY+9PL4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1683551273; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Y6lNVpaJnRA5vbfpuPG6bwOrY+0T2UYLTmgFR8i/UTI=; b=bmpyimNDxVNCTpOAHSFpDNVAFpPqO4gEGTlUT7bbWVKldfGZMH8uYbI2ggElwLmxQNTaaE OllILjiLFaEnLjL5frivIX3T4GOUnWRsHNLEGc/0GVGZrcmHT5PJQbSaKomqSmzYzD9GtF uJ3hZHUpFw9mkVNJIr8L9ZvWtrh9H2AIH12ATzZA6LVihYWd5LlwTtKbO+hT/Sf0ABReoA aD9pk1WMqDvNapGB8drTtbK3C+/EAW48I380YzzdlcjF65OVUCJrj2j1V/EFJbx6az1671 z5EBSbMLc7lmWU7yfl++lfWYAwL5jHB+x1uX55Ud5VePfEE1TsLn/Mv0q3T2/w== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1683551273; a=rsa-sha256; cv=none; b=bk2VM/p5Y08dHIvL0hgLtNCr7UIncheZva0Gle7SucI4G8cy+hYupjmOy851nWi7ur3zwy MeXbU0QA0qiUvtaxtlnPpWqox1rM2ZgTXUA8uoVI6C2v1PFUF41z8iB23aU85Pf9M3ndpX 6NVjDE5f84695BZhSHyg5gKqQ9XrhOY0XWKFi0872/x/xM0IHNk39jIOINIbFpVa3PLMv3 cToBbaVOdd2vFdToOWPDSplp6bmexoIphWgQR3tedt8lwkPkJ5n8f+wTYBvQwaQR354xYE FkqOhBQqgxhUbHXJ2mH2Nm5yrHJtMZB0mys/wHw7sDuytL65t3RQLizSTcg5Ng== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4QFM614XtNz11tl; Mon, 8 May 2023 13:07:53 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 348D7rKM013802; Mon, 8 May 2023 13:07:53 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 348D7rxt013801; Mon, 8 May 2023 13:07:53 GMT (envelope-from git) Date: Mon, 8 May 2023 13:07:53 GMT Message-Id: <202305081307.348D7rxt013801@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: =?utf-8?Q?Fernando=20Apestegu=C3=ADa?= Subject: git: ed9db3818d7f - main - security/vuxml: Multiple glpi vulnerabilities List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: fernape X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: ed9db3818d7f005456e6870bb3e73dacc7667c58 Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=ed9db3818d7f005456e6870bb3e73dacc7667c58 commit ed9db3818d7f005456e6870bb3e73dacc7667c58 Author: Fernando ApesteguĂ­a AuthorDate: 2023-05-08 11:55:58 +0000 Commit: Fernando ApesteguĂ­a CommitDate: 2023-05-08 13:03:02 +0000 security/vuxml: Multiple glpi vulnerabilities CVE-2023-28849 CVE-2023-28632 CVE-2023-28838 CVE-2023-28852 CVE-2023-28636 CVE-2023-28639 CVE-2023-28634 CVE-2023-28633 PR: 271286 Reported by: mathias@monnerville.com --- security/vuxml/vuln/2023.xml | 50 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 5299ac88e020..272a3001ea5e 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,53 @@ + + glpi -- multiple vulnerabilities + + + glpi + 10.0.7 + + + + +

glpi Project reports:

+
+

Multiple vulnerabilities found and fixed in this version:

+
    +
  • High CVE-2023-28849: SQL injection and Stored XSS via inventory agent request.
  • +
  • High CVE-2023-28632: Account takeover by authenticated user.
  • +
  • High CVE-2023-28838: SQL injection through dynamic reports.
  • +
  • Moderate CVE-2023-28852: Stored XSS through dashboard administration.
  • +
  • Moderate CVE-2023-28636: Stored XSS on external links.
  • +
  • Moderate CVE-2023-28639: Reflected XSS in search pages.
  • +
  • Moderate CVE-2023-28634: Privilege Escalation from technician to super-admin.
  • +
  • Low CVE-2023-28633: Blind Server-Side Request Forgery (SSRF) in RSS feeds.
  • +
+
+ +
+ + + https://cve.mitre.org/cgi-bin/cvename.cgi?name= + CVE-2023-28849 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28849 + CVE-2023-28632 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28632 + CVE-2023-28838 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28838 + CVE-2023-28852 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28852 + CVE-2023-28636 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28636 + CVE-2023-28639 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28639 + CVE-2023-28634 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28634 + + + 2023-03-20 + 2023-05-08 + +
+ redis -- HINCRBYFLOAT can be used to crash a redis-server process