svn commit: r429204 - head/security/vuxml
Baptiste Daroussin
bapt at FreeBSD.org
Thu Dec 22 23:39:46 UTC 2016
Author: bapt
Date: Thu Dec 22 23:39:44 2016
New Revision: 429204
URL: https://svnweb.freebsd.org/changeset/ports/429204
Log:
Add a entry about a XSS concerning www/pligg
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Dec 22 23:22:56 2016 (r429203)
+++ head/security/vuxml/vuln.xml Thu Dec 22 23:39:44 2016 (r429204)
@@ -58,6 +58,36 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="c290f093-c89e-11e6-821e-68f7288bdf41">
+ <topic>Pligg CMS -- XSS Vulnerability</topic>
+ <affects>
+ <package>
+ <name>pligg</name>
+ <range><le>2.0.2,1</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Netsparker reports: </p>
+ <blockquote cite="https://www.netsparker.com/web-applications-advisories/ns-15-011-xss-vulnerability-identified-in-pligg-cms/">
+ <p>Proof of Concept URL for XSS in Pligg CMS:</p>
+ <p>Page: groups.php</p>
+ <p>Parameter Name: keyword</p>
+ <p>Parameter Type: GET</p>
+ <p>Attack Pattern: http://example.com/pligg-cms-2.0.2/groups.php?view=search&keyword='+alert(0x000D82)+'</p>
+ <p>For more information on cross-site scripting vulnerabilities read the article Cross-site Scripting (XSS).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.netsparker.com/web-applications-advisories/ns-15-011-xss-vulnerability-identified-in-pligg-cms/</url>
+ </references>
+ <dates>
+ <discovery>2015-05-13</discovery>
+ <entry>2016-12-22</entry>
+ </dates>
+ </vuln>
+
<vuln vid="fcedcdbb-c86e-11e6-b1cf-14dae9d210b8">
<topic>FreeBSD -- Multiple vulnerabilities of ntp</topic>
<affects>
More information about the svn-ports-all
mailing list