From owner-svn-ports-all@freebsd.org Fri Dec 14 11:57:21 2018 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DD808132FA95; Fri, 14 Dec 2018 11:57:20 +0000 (UTC) (envelope-from joneum@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 84C2A6DAD5; Fri, 14 Dec 2018 11:57:20 +0000 (UTC) (envelope-from joneum@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 14A552EE26; Fri, 14 Dec 2018 11:57:20 +0000 (UTC) (envelope-from joneum@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id wBEBvJS0010418; Fri, 14 Dec 2018 11:57:19 GMT (envelope-from joneum@FreeBSD.org) Received: (from joneum@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id wBEBvJvS010416; Fri, 14 Dec 2018 11:57:19 GMT (envelope-from joneum@FreeBSD.org) Message-Id: <201812141157.wBEBvJvS010416@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: joneum set sender to joneum@FreeBSD.org using -f From: Jochen Neumeister Date: Fri, 14 Dec 2018 11:57:19 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r487425 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: joneum X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 487425 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 84C2A6DAD5 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-1.40 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-0.85)[-0.853,0]; NEURAL_HAM_SHORT(-0.55)[-0.549,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 14 Dec 2018 11:57:21 -0000 Author: joneum Date: Fri Dec 14 11:57:19 2018 New Revision: 487425 URL: https://svnweb.freebsd.org/changeset/ports/487425 Log: Add entry for typo3-8 and typo3-9 PR: 233935 233936 Sponsored by: Netzkommune GmbH Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Dec 14 11:28:43 2018 (r487424) +++ head/security/vuxml/vuln.xml Fri Dec 14 11:57:19 2018 (r487425) @@ -58,6 +58,68 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + typo3 -- multiple vulnerabilities + + + typo3-8 + 8.7.21 + + + typo3-9 + 9.5.2 + + + + +

Typo3 core team reports:

+
+

CKEditor 4.11 fixes an XSS vulnerability in the HTML parser reported by maxarr. + The vulnerability stemmed from the fact that it was possible to execute XSS inside + the CKEditor source area after persuading the victim to: (i) switch CKEditor to + source mode, then (ii) paste a specially crafted HTML code, prepared by the attacker, + into the opened CKEditor source area, and (iii) switch back to WYSIWYG mode. + Although this is an unlikely scenario, we recommend to upgrade to the latest editor version.

+

Failing to properly encode user input, online media asset rendering + (*.youtube and *.vimeo files) is vulnerable to cross-site scripting. A valid backend user + account or write access on the server system (e.g. SFTP) is needed in order to exploit this + vulnerability.

+

Failing to properly encode user input, notifications shown in modal windows in the TYPO3 + backend are vulnerable to cross-site scripting. A valid backend user account is needed in + order to exploit this vulnerability.

+

Failing to properly encode user input, login status display is vulnerable to cross-site + scripting in the website frontend. A valid user account is needed in order to exploit this + vulnerability - either a backend user or a frontend user having the possibility to modify + their user profile. + Template patterns that are affected are: + ###FEUSER_[fieldName]### using system extension felogin + for regular frontend rendering (pattern can be defined individually + using TypoScript setting config.USERNAME_substToken)

+

It has been discovered that cookies created in the Install Tool are not hardened to be + submitted only via HTTP. In combination with other vulnerabilities such as cross-site + scripting it can lead to hijacking an active and valid session in the Install Tool.

+

The Install Tool exposes the current TYPO3 version number to non-authenticated users.

+

Online Media Asset Handling (*.youtube and *.vimeo files) in the TYPO3 backend is vulnerable + to denial of service. Putting large files with according file extensions results in high + consumption of system resources. This can lead to exceeding limits of the current PHP process + which results in a dysfunctional backend component. A valid backend user account or write + access on the server system (e.g. SFTP) is needed in order to exploit this vulnerability.

+

TYPO3’s built-in record registration functionality (aka “basic shopping cart”) using recs + URL parameters is vulnerable to denial of service. Failing to properly ensure that anonymous + user sessions are valid, attackers can use this vulnerability in order to create an arbitrary + amount of individual session-data records in the database.

+
+ +
+ + https://typo3.org/article/typo3-952-8721-and-7632-security-releases-published/ + + + 2018-12-11 + 2018-12-14 + +
+ Gitlab -- Arbitrary File read in GitLab project import with Git LFS