git: 89a07f2c7f41 - main - security/vuxml: Document vulnerabilities in phpmyfaq

From: Florian Smeets <flo_at_FreeBSD.org>
Date: Tue, 13 Dec 2022 18:54:22 UTC
The branch main has been updated by flo:

URL: https://cgit.FreeBSD.org/ports/commit/?id=89a07f2c7f41831125e917875e7d07680e98c8d2

commit 89a07f2c7f41831125e917875e7d07680e98c8d2
Author:     Florian Smeets <flo@FreeBSD.org>
AuthorDate: 2022-12-13 18:42:12 +0000
Commit:     Florian Smeets <flo@FreeBSD.org>
CommitDate: 2022-12-13 18:51:16 +0000

    security/vuxml: Document vulnerabilities in phpmyfaq
---
 security/vuxml/vuln/2022.xml | 45 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 45 insertions(+)

diff --git a/security/vuxml/vuln/2022.xml b/security/vuxml/vuln/2022.xml
index 70a5c2f53341..ec57619eea84 100644
--- a/security/vuxml/vuln/2022.xml
+++ b/security/vuxml/vuln/2022.xml
@@ -1,3 +1,48 @@
+  <vuln vid="439f3f81-7a49-11ed-97ac-589cfc0f81b0">
+    <topic>phpmyfaq -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>phpmyfaq</name>
+	<range><lt>3.1.9</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>phpmyfaq developers report:</p>
+	<blockquote cite="https://www.phpmyfaq.de/security/advisory-2022-10-24">
+	  <p>an authenticated SQL injection when adding categories in the admin backend</p>
+	  <p>a stored cross-site scripting vulnerability in the category name</p>
+	  <p>a stored cross-site scripting vulnerability in the admin logging</p>
+	  <p>a stored cross-site scripting vulnerability in the FAQ title</p>
+	  <p>a PostgreSQL based SQL injection for the lang parameter </p>
+	  <p>a SQL injection when storing an instance name in the admin backend</p>
+	  <p>a SQL injection when adding attachments in the admin backend</p>
+	  <p>a stored cross-site scripting vulnerability when adding users by admins</p>
+	  <p>a missing "secure" flag for cookies when using TLS</p>
+	  <p>a cross-site request forgery / cross-site scripting vulnerability when saving new questions</p>
+	  <p>a reflected cross-site scripting vulnerability in the admin backend</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://huntr.dev/bounties/a1649f43-78c9-4927-b313-36911872a84b/</url>
+      <url>https://huntr.dev/bounties/2ec4ddd4-de22-4f2d-ba92-3382b452bfea/</url>
+      <url>https://huntr.dev/bounties/5915ed4c-5fe2-42e7-8fac-5dd0d032727c/</url>
+      <url>https://huntr.dev/bounties/5944f154-c0ab-4547-9d9d-3101e86eb975/</url>
+      <url>https://huntr.dev/bounties/315aa78d-7bd2-4b14-86f2-b5c211e62034/</url>
+      <url>https://huntr.dev/bounties/eb3a8ea3-daea-4555-a3e6-80b82f533792/</url>
+      <url>https://huntr.dev/bounties/faac0c92-8d4b-4901-a933-662b661a3f99/</url>
+      <url>https://huntr.dev/bounties/56499a60-2358-41fe-9b38-8cb23cdfc17c/</url>
+      <url>https://huntr.dev/bounties/f531bbf2-32c8-4efe-8156-ae9bc6b5d3aa/</url>
+      <url>https://huntr.dev/bounties/322c12b1-08d5-4ee3-9d94-d4bb40366c7a/</url>
+      <url>https://huntr.dev/bounties/f2857bc7-8fbc-489a-9a38-30b93300eec5/</url>
+    </references>
+    <dates>
+      <discovery>2022-12-11</discovery>
+      <entry>2022-12-12</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="508da89c-78b9-11ed-854f-5404a68ad561">
     <topic>traefik -- multiple vulnerabilities</topic>
     <affects>