Date: Thu, 15 Apr 2021 14:50:37 GMT From: Mateusz Piotrowski <0mp@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: bc32e1b3c9bb - main - Document textproc/mdbook vulnerability Message-ID: <202104151450.13FEobXV079334@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by 0mp: URL: https://cgit.FreeBSD.org/ports/commit/?id=bc32e1b3c9bb4cd5a415e6ed3924835ecaefc197 commit bc32e1b3c9bb4cd5a415e6ed3924835ecaefc197 Author: Mateusz Piotrowski <0mp@FreeBSD.org> AuthorDate: 2021-04-15 14:46:59 +0000 Commit: Mateusz Piotrowski <0mp@FreeBSD.org> CommitDate: 2021-04-15 14:46:59 +0000 Document textproc/mdbook vulnerability --- security/vuxml/vuln.xml | 40 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d3afeef3c82c..7172d2da30e7 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -76,6 +76,46 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="40b481a9-9df7-11eb-9bc3-8c164582fbac"> + <topic>mdbook -- XSS in mdBook's search page</topic> + <affects> + <package> + <name>mdbook</name> + <range><lt>0.4.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Rust Security Response Working Group reports:</p> + <blockquote cite="https://github.com/rust-lang/mdBook/security/advisories/GHSA-gx5w-rrhp-f436"> + <p> + The search feature of mdBook (introduced in version 0.1.4) was + affected by a cross site scripting vulnerability that allowed an + attacker to execute arbitrary JavaScript code on an user's browser + by tricking the user into typing a malicious search query, or + tricking the user into clicking a link to the search page with the + malicious search query prefilled. + + mdBook 0.4.5 fixes the vulnerability by properly escaping the search + query. + </p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/rust-lang/mdBook/blob/master/CHANGELOG.md#mdbook-045</url> + <url>https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b</url> + <url>https://github.com/rust-lang/mdBook/security/advisories/GHSA-gx5w-rrhp-f436</url> + <url>https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0?pli=1</url> + <url>https://nvd.nist.gov/vuln/detail/CVE-2020-26297</url> + <cvename>CVE-2020-26297</cvename> + </references> + <dates> + <discovery>2021-04-01</discovery> + <entry>2021-04-15</entry> + </dates> + </vuln> + <vuln vid="fb6e53ae-9df6-11eb-ba8c-001b217b3468"> <topic>Gitlab -- Vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202104151450.13FEobXV079334>