Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 29 May 2020 02:07:53 +0000 (UTC)
From:      Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r536876 - head/security/vuxml
Message-ID:  <202005290207.04T27rT3047688@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: sunpoet
Date: Fri May 29 02:07:53 2020
New Revision: 536876
URL: https://svnweb.freebsd.org/changeset/ports/536876

Log:
  Fix r536871

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri May 29 02:03:29 2020	(r536875)
+++ head/security/vuxml/vuln.xml	Fri May 29 02:07:53 2020	(r536876)
@@ -72,13 +72,7 @@ Notes:
 	<blockquote cite="https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433">;
 	  <p>There was a vulnerability in versions of Kaminari that would allow an
 	    attacker to inject arbitrary code into pages with pagination links.</p>
-	  <p>For example, an attacker could craft pagination links that link to
-	    other domain or host:
-	    https://example.com/posts?page=4&nbsp;original_script_name=https://another-host.example.com</p>;
-	  <p>In addition, an attacker could also craft pagination links that include
-	    JavaScript code that runs when a user clicks the link:
-	    https://example.com/posts?page=4&nbsp;original_script_name=javascript:alert(42)%3b//</p>;
-	  <p>The 1.2.1 gem including the patch has already been released.<p>
+	  <p>The 1.2.1 gem including the patch has already been released.</p>
 	  <p>All past released versions are affected by this vulnerability.</p>
 	</blockquote>
       </body>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202005290207.04T27rT3047688>