svn commit: r429139 - head/security/vuxml
Jason Unovitch
junovitch at FreeBSD.org
Thu Dec 22 03:22:00 UTC 2016
Author: junovitch
Date: Thu Dec 22 03:21:59 2016
New Revision: 429139
URL: https://svnweb.freebsd.org/changeset/ports/429139
Log:
Document Joomla! security advisories since 3.4.6 was released.
While here, update entry for 3.4.6 with final advisory information from
JSST page.
A big thanks to Larry Rosenman for reporting the open issues and getting the
port up to date.
PR: 215058
Reported by: Larry Rosenman <ler at lerctr.org>
Security: CVE-2016-8869
Security: CVE-2016-8870
Security: CVE-2016-9081
Security: CVE-2016-9836
Security: CVE-2016-9837
Security: CVE-2016-9838
Security: https://vuxml.FreeBSD.org/freebsd/624b45c0-c7f3-11e6-ae1b-002590263bf5.html
Security: https://vuxml.FreeBSD.org/freebsd/a27d234a-c7f2-11e6-ae1b-002590263bf5.html
Security: https://vuxml.FreeBSD.org/freebsd/c0ef061a-c7f0-11e6-ae1b-002590263bf5.html
Security: https://vuxml.FreeBSD.org/freebsd/f0806cad-c7f1-11e6-ae1b-002590263bf5.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Dec 22 02:15:31 2016 (r429138)
+++ head/security/vuxml/vuln.xml Thu Dec 22 03:21:59 2016 (r429139)
@@ -58,6 +58,175 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="624b45c0-c7f3-11e6-ae1b-002590263bf5">
+ <topic>Joomla! -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>joomla3</name>
+ <range><ge>1.6.0</ge><lt>3.6.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The JSST and the Joomla! Security Center report:</p>
+ <blockquote cite="https://developer.joomla.org/security-centre/664-20161201-core-elevated-privileges.html">
+ <h2>[20161201] - Core - Elevated Privileges</h2>
+ <p>Incorrect use of unfiltered data stored to the session on a form
+ validation failure allows for existing user accounts to be modified;
+ to include resetting their username, password, and user group
+ assignments.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/665-20161202-core-shell-upload.html">
+ <h2>[20161202] - Core - Shell Upload</h2>
+ <p>Inadequate filesystem checks allowed files with alternative PHP
+ file extensions to be uploaded.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/666-20161203-core-information-disclosure.html">
+ <h2>[20161203] - Core - Information Disclosure</h2>
+ <p>Inadequate ACL checks in the Beez3 com_content article layout
+ override enables a user to view restricted content.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-9836</cvename>
+ <cvename>CVE-2016-9837</cvename>
+ <cvename>CVE-2016-9838</cvename>
+ <url>https://developer.joomla.org/security-centre/664-20161201-core-elevated-privileges.html</url>
+ <url>https://developer.joomla.org/security-centre/665-20161202-core-shell-upload.html</url>
+ <url>https://developer.joomla.org/security-centre/666-20161203-core-information-disclosure.html</url>
+ <url>https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.html</url>
+ </references>
+ <dates>
+ <discovery>2016-12-06</discovery>
+ <entry>2016-12-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a27d234a-c7f2-11e6-ae1b-002590263bf5">
+ <topic>Joomla! -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>joomla3</name>
+ <range><ge>3.4.4</ge><lt>3.6.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The JSST and the Joomla! Security Center report:</p>
+ <blockquote cite="https://developer.joomla.org/security-centre/659-20161001-core-account-creation.html">
+ <h2>[20161001] - Core - Account Creation</h2>
+ <p>Inadequate checks allows for users to register on a site when
+ registration has been disabled.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/660-20161002-core-elevated-privileges.html">
+ <h2>[20161002] - Core - Elevated Privilege</h2>
+ <p>Incorrect use of unfiltered data allows for users to register on a
+ site with elevated privileges.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/661-20161003-core-account-modifications.html">
+ <h2>[20161003] - Core - Account Modifications</h2>
+ <p>Incorrect use of unfiltered data allows for existing user accounts
+ to be modified; to include resetting their username, password, and
+ user group assignments.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-8869</cvename>
+ <cvename>CVE-2016-8870</cvename>
+ <cvename>CVE-2016-9081</cvename>
+ <url>https://developer.joomla.org/security-centre/659-20161001-core-account-creation.html</url>
+ <url>https://developer.joomla.org/security-centre/660-20161002-core-elevated-privileges.html</url>
+ <url>https://developer.joomla.org/security-centre/661-20161003-core-account-modifications.html</url>
+ <url>https://www.joomla.org/announcements/release-news/5678-joomla-3-6-4-released.html</url>
+ </references>
+ <dates>
+ <discovery>2016-10-25</discovery>
+ <entry>2016-12-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="f0806cad-c7f1-11e6-ae1b-002590263bf5">
+ <topic>Joomla! -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>joomla3</name>
+ <range><ge>1.6.0</ge><lt>3.6.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The JSST and the Joomla! Security Center report:</p>
+ <blockquote cite="https://developer.joomla.org/security-centre/652-20160801-core-core-acl-violations.html">
+ <h2>[20160801] - Core - ACL Violation</h2>
+ <p>Inadequate ACL checks in com_content provide potential read access
+ to data which should be access restricted to users with edit_own
+ level.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/653-20160802-core-xss-vulnerability.html">
+ <h2>[20160802] - Core - XSS Vulnerability</h2>
+ <p>Inadequate escaping leads to XSS vulnerability in mail component.
+ </p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/654-20160803-core-csrf.html">
+ <h2>[20160803] - Core - CSRF</h2>
+ <p>Add additional CSRF hardening in com_joomlaupdate.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://developer.joomla.org/security-centre/652-20160801-core-core-acl-violations.html</url>
+ <url>https://developer.joomla.org/security-centre/653-20160802-core-xss-vulnerability.html</url>
+ <url>https://developer.joomla.org/security-centre/654-20160803-core-csrf.html</url>
+ <url>https://www.joomla.org/announcements/release-news/5665-joomla-3-6-1-released.html</url>
+ </references>
+ <dates>
+ <discovery>2016-08-03</discovery>
+ <entry>2016-12-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c0ef061a-c7f0-11e6-ae1b-002590263bf5">
+ <topic>Joomla! -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>joomla3</name>
+ <range><ge>1.5.0</ge><lt>3.4.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The JSST and the Joomla! Security Center report:</p>
+ <blockquote cite="https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html">
+ <h2>[20151206] - Core - Session Hardening</h2>
+ <p>The Joomla Security Strike team has been following up on the
+ critical security vulnerability patched last week. Since the recent
+ update it has become clear that the root cause is a bug in PHP
+ itself. This was fixed by PHP in September of 2015 with the releases
+ of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all
+ versions of PHP 7 and has been back-ported in some specific Linux
+ LTS versions of PHP 5.3). This fixes the bug across all supported
+ PHP versions.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/640-20151207-core-sql-injection.html">
+ <h2>[20151207] - Core - SQL Injection</h2>
+ <p>Inadequate filtering of request data leads to a SQL Injection
+ vulnerability.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html</url>
+ <url>https://developer.joomla.org/security-centre/640-20151207-core-sql-injection.html</url>
+ <url>https://www.joomla.org/announcements/release-news/5643-joomla-3-4-7.html</url>
+ </references>
+ <dates>
+ <discovery>2015-12-21</discovery>
+ <entry>2016-12-22</entry>
+ </dates>
+ </vuln>
+
<vuln vid="3ae078ca-c7eb-11e6-ae1b-002590263bf5">
<topic>xen-kernel -- x86 PV guests may be able to mask interrupts</topic>
<affects>
@@ -21854,12 +22023,27 @@ and CVE-2013-0155.</p>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>Joomla! reports:</p>
- <blockquote cite="https://www.joomla.org/announcements/release-news/5641-joomla-3-4-6-released.html">
- <p>Joomla! 3.4.6 is now available. This is a security release
- for the 3.x series of Joomla which addresses a critical security
- vulnerability and 4 low level security vulnerabilities. We strongly
- recommend that you update your sites immediately.</p>
+ <p>The JSST and the Joomla! Security Center report:</p>
+ <blockquote cite="https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html">
+ <h2>[20151201] - Core - Remote Code Execution Vulnerability</h2>
+ <p>Browser information is not filtered properly while saving the
+ session values into the database which leads to a Remote Code
+ Execution vulnerability.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/633-20151214-core-csrf-hardening.html">
+ <h2>[20151202] - Core - CSRF Hardening</h2>
+ <p>Add additional CSRF hardening in com_templates.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/634-20151214-core-directory-traversal.html">
+ <h2>[20151203] - Core - Directory Traversal</h2>
+ <p>Failure to properly sanitise input data from the XML install file
+ located within an extension's package archive allows for directory
+ traversal.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/635-20151214-core-directory-traversal-2.html">
+ <h2>[20151204] - Core - Directory Traversal</h2>
+ <p>Inadequate filtering of request data leads to a Directory Traversal
+ vulnerability.</p>
</blockquote>
</body>
</description>
@@ -21869,10 +22053,15 @@ and CVE-2013-0155.</p>
<cvename>CVE-2015-8563</cvename>
<cvename>CVE-2015-8564</cvename>
<cvename>CVE-2015-8565</cvename>
+ <url>https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html</url>
+ <url>https://developer.joomla.org/security-centre/633-20151214-core-csrf-hardening.html</url>
+ <url>https://developer.joomla.org/security-centre/634-20151214-core-directory-traversal.html</url>
+ <url>https://developer.joomla.org/security-centre/635-20151214-core-directory-traversal-2.html</url>
</references>
<dates>
<discovery>2015-12-14</discovery>
<entry>2015-12-17</entry>
+ <modified>2016-12-22</modified>
</dates>
</vuln>
More information about the svn-ports-head
mailing list