summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorXin LI <delphij@FreeBSD.org>2011-09-13 01:11:03 +0000
committerXin LI <delphij@FreeBSD.org>2011-09-13 01:11:03 +0000
commita8ad1488b25b0c659c219caa362c7c5f43c507f0 (patch)
tree5dd445d8de4fc753633ee0c93c400f87f26b41c0 /security
parent- Bump PORTREVISION for databases/gdbm update (diff)
Document roundcube XSS vulnerability.
Notes
Notes: svn path=/head/; revision=281711
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml36
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c995700ae7d4..dd16a88e659e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="4ae68e7c-dda4-11e0-a906-00215c6a37bb">
+ <topic>roundcube -- XSS vulnerability</topic>
+ <affects>
+ <package>
+ <name>roundcube</name>
+ <range><lt>0.5.4,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>RoundCube development Team reports:</p>
+ <blockquote cite="http://sourceforge.net/news/?group_id=139281&amp;id=302769">
+ <p>We just published a new release which fixes a recently
+ reported XSS vulnerability as an update to the stable
+ 0.5 branch. Please update your installations with this
+ new version or patch them with the fix which is also
+ published in the downloads section or our sourceforge.net
+ page.</p>
+ </blockquote>
+ <p>and:</p>
+ <blockquote cite="http://trac.roundcube.net/ticket/1488030">
+ <p>During one of pen-tests I found that _mbox parameter
+ is not properly sanitized and reflected XSS attack is
+ possible.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2011-2937</cvename>
+ </references>
+ <dates>
+ <discovery>2011-08-09</discovery>
+ <entry>2011-09-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6">
<topic>libsndfile -- PAF file processing integer overflow</topic>
<affects>