Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 15 Apr 2021 14:50:37 GMT
From:      Mateusz Piotrowski <0mp@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: bc32e1b3c9bb - main - Document textproc/mdbook vulnerability
Message-ID:  <202104151450.13FEobXV079334@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by 0mp:

URL: https://cgit.FreeBSD.org/ports/commit/?id=bc32e1b3c9bb4cd5a415e6ed3924835ecaefc197

commit bc32e1b3c9bb4cd5a415e6ed3924835ecaefc197
Author:     Mateusz Piotrowski <0mp@FreeBSD.org>
AuthorDate: 2021-04-15 14:46:59 +0000
Commit:     Mateusz Piotrowski <0mp@FreeBSD.org>
CommitDate: 2021-04-15 14:46:59 +0000

    Document textproc/mdbook vulnerability
---
 security/vuxml/vuln.xml | 40 ++++++++++++++++++++++++++++++++++++++++
 1 file changed, 40 insertions(+)

diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d3afeef3c82c..7172d2da30e7 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -76,6 +76,46 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="40b481a9-9df7-11eb-9bc3-8c164582fbac">
+    <topic>mdbook -- XSS in mdBook's search page</topic>
+    <affects>
+      <package>
+	<name>mdbook</name>
+	<range><lt>0.4.5</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Rust Security Response Working Group reports:</p>
+	<blockquote cite="https://github.com/rust-lang/mdBook/security/advisories/GHSA-gx5w-rrhp-f436">;
+	  <p>
+	    The search feature of mdBook (introduced in version 0.1.4) was
+	    affected by a cross site scripting vulnerability that allowed an
+	    attacker to execute arbitrary JavaScript code on an user's browser
+	    by tricking the user into typing a malicious search query, or
+	    tricking the user into clicking a link to the search page with the
+	    malicious search query prefilled.
+
+	    mdBook 0.4.5 fixes the vulnerability by properly escaping the search
+	    query.
+	  </p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://github.com/rust-lang/mdBook/blob/master/CHANGELOG.md#mdbook-045</url>;
+      <url>https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b</url>;
+      <url>https://github.com/rust-lang/mdBook/security/advisories/GHSA-gx5w-rrhp-f436</url>;
+      <url>https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0?pli=1</url>;
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2020-26297</url>;
+      <cvename>CVE-2020-26297</cvename>
+    </references>
+    <dates>
+      <discovery>2021-04-01</discovery>
+      <entry>2021-04-15</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="fb6e53ae-9df6-11eb-ba8c-001b217b3468">
     <topic>Gitlab -- Vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202104151450.13FEobXV079334>