Date: Wed, 10 Mar 2021 14:03:45 +0000 (UTC) From: Li-Wen Hsu <lwhsu@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r568002 - head/security/vuxml Message-ID: <202103101403.12AE3jVH093785@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: lwhsu Date: Wed Mar 10 14:03:45 2021 New Revision: 568002 URL: https://svnweb.freebsd.org/changeset/ports/568002 Log: Document vulnerabilities in databases/mantis <2.24.4 PR: 252612 Submitted by: Zoltan ALEXANDERSON BESSE <zab@zltech.eu> Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Mar 10 13:35:37 2021 (r568001) +++ head/security/vuxml/vuln.xml Wed Mar 10 14:03:45 2021 (r568002) @@ -78,6 +78,50 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="2dc8927b-54e0-11eb-9342-1c697a013f4b"> + <topic>mantis -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mantis-php72</name> + <name>mantis-php73</name> + <name>mantis-php74</name> + <name>mantis-php80</name> + <range><lt>2.24.4,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mantis 2.24.4 release reports:</p> + <blockquote cite="https://mantisbt.org/bugs/changelog_page.php?project=mantisbt&version=2.24.4"> + <p>Security and maintenance release, addressing 6 CVEs:</p> + <ul> + <li>0027726: CVE-2020-29603: disclosure of private project name</li> + <li>0027727: CVE-2020-29605: disclosure of private issue summary</li> + <li>0027728: CVE-2020-29604: full disclosure of private issue contents, including bugnotes and attachments</li> + <li>0027361: Private category can be access/used by a non member of a private project (IDOR)</li> + <li>0027779: CVE-2020-35571: XSS in helper_ensure_confirmed() calls</li> + <li>0026794: User Account - Takeover</li> + <li>0027363: Fixed in version can be changed to a version that doesn't exist</li> + <li>0027350: When updating an issue, a Viewer user can be set as Reporter</li> + <li>0027370: CVE-2020-35849: Revisions allow viewing private bugnotes id and summary</li> + <li>0027495: CVE-2020-28413: SQL injection in the parameter "access" on the mc_project_get_users function throught the API SOAP.</li> + <li>0027444: Printing unsanitized user input in install.php</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-28413</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28413</url> + <cvename>CVE-2020-35849</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35849</url> + </references> + <dates> + <discovery>2020-11-10</discovery> + <entry>2021-03-10</entry> + </dates> + </vuln> + <vuln vid="2f3cd69e-7dee-11eb-b92e-0022489ad614"> <topic>Node.js -- February 2021 Security Releases</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202103101403.12AE3jVH093785>