Date: Mon, 8 May 2023 13:07:53 GMT From: =?utf-8?Q?Fernando=20Apestegu=C3=ADa?= <fernape@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: ed9db3818d7f - main - security/vuxml: Multiple glpi vulnerabilities Message-ID: <202305081307.348D7rxt013801@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=ed9db3818d7f005456e6870bb3e73dacc7667c58 commit ed9db3818d7f005456e6870bb3e73dacc7667c58 Author: Fernando ApesteguĂa <fernape@FreeBSD.org> AuthorDate: 2023-05-08 11:55:58 +0000 Commit: Fernando ApesteguĂa <fernape@FreeBSD.org> CommitDate: 2023-05-08 13:03:02 +0000 security/vuxml: Multiple glpi vulnerabilities CVE-2023-28849 CVE-2023-28632 CVE-2023-28838 CVE-2023-28852 CVE-2023-28636 CVE-2023-28639 CVE-2023-28634 CVE-2023-28633 PR: 271286 Reported by: mathias@monnerville.com --- security/vuxml/vuln/2023.xml | 50 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 5299ac88e020..272a3001ea5e 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,53 @@ + <vuln vid="68958e18-ed94-11ed-9688-b42e991fc52e"> + <topic>glpi -- multiple vulnerabilities</topic> + <affects> + <package> + <name>glpi</name> + <range><lt>10.0.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>glpi Project reports:</p> + <blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.7"> + <p>Multiple vulnerabilities found and fixed in this version:</p> + <ul> + <li>High CVE-2023-28849: SQL injection and Stored XSS via inventory agent request.</li> + <li>High CVE-2023-28632: Account takeover by authenticated user.</li> + <li>High CVE-2023-28838: SQL injection through dynamic reports.</li> + <li>Moderate CVE-2023-28852: Stored XSS through dashboard administration.</li> + <li>Moderate CVE-2023-28636: Stored XSS on external links.</li> + <li>Moderate CVE-2023-28639: Reflected XSS in search pages.</li> + <li>Moderate CVE-2023-28634: Privilege Escalation from technician to super-admin.</li> + <li>Low CVE-2023-28633: Blind Server-Side Request Forgery (SSRF) in RSS feeds.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename></cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=</url> + <cvename>CVE-2023-28849</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28849</url> + <cvename>CVE-2023-28632</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28632</url> + <cvename>CVE-2023-28838</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28838</url> + <cvename>CVE-2023-28852</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28852</url> + <cvename>CVE-2023-28636</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28636</url> + <cvename>CVE-2023-28639</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28639</url> + <cvename>CVE-2023-28634</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28634</url> + </references> + <dates> + <discovery>2023-03-20</discovery> + <entry>2023-05-08</entry> + </dates> + </vuln> + <vuln vid="96b2d4db-ddd2-11ed-b6ea-080027f5fec9"> <topic>redis -- HINCRBYFLOAT can be used to crash a redis-server process</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202305081307.348D7rxt013801>