svn commit: r536198 - head/security/vuxml
Jochen Neumeister
joneum at FreeBSD.org
Fri May 22 13:07:47 UTC 2020
Author: joneum
Date: Fri May 22 13:07:46 2020
New Revision: 536198
URL: https://svnweb.freebsd.org/changeset/ports/536198
Log:
Add entry for drual7
Sponsored by: Netzkommune GmbH
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri May 22 11:18:52 2020 (r536197)
+++ head/security/vuxml/vuln.xml Fri May 22 13:07:46 2020 (r536198)
@@ -58,6 +58,41 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="c5ec57a9-9c2b-11ea-82b8-4c72b94353b5">
+ <topic>drupal -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>drupal7</name>
+ <range><lt>7.70</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Security Team reports:</p>
+ <blockquote cite="https://www.drupal.org/project/drupal/releases/7.70">
+ <p>The jQuery project released version 3.5.0, and as part of that,
+ disclosed two security vulnerabilities that affect all prior versions.
+ As mentioned in the jQuery blog, both are: ... Security issues in
+ jQuerys DOM manipulation methods, as in .html(), .append(), and the others.
+ Security advisories for both of these issues have been published on GitHub.</p>
+ <p>Drupal 7 has an Open Redirect vulnerability.
+ For example, a user could be tricked into visiting a specially crafted link
+ which would redirect them to an arbitrary external URL. The vulnerability is
+ caused by insufficient validation of the destination query parameter in the
+ drupal_goto() function.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.drupal.org/sa-core-2020-002</url>
+ <url>https://www.drupal.org/sa-core-2020-003</url>
+ </references>
+ <dates>
+ <discovery>2020-05-20</discovery>
+ <entry>2020-05-22</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4d11d37e-9a8d-11ea-b9b8-641c67a117d8">
<topic>Zabbix -- Remote code execution</topic>
<affects>
More information about the svn-ports-head
mailing list