Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=464cb5fc7e8bbcf24f0fe7e16a61b692b8ab3eb3
commit 464cb5fc7e8bbcf24f0fe7e16a61b692b8ab3eb3 Author: voroskoi <[EMAIL PROTECTED]> Date: Mon Jan 21 21:05:01 2008 +0100 FSA356-mantis diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index abd69c6..adcebd3 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,19 @@ <fsas> <fsa> + <id>356</id> + <date>2008-01-21</date> + <author>voroskoi</author> + <package>mantis</package> + <vulnerable>1.0.8-1</vulnerable> + <unaffected>1.0.8-2sayshell1</unaffected> + <bts>http://bugs.frugalware.org/task/2683</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6611</cve> + <desc>seiji has discovered a vulnerability in Mantis, which can be exploited by malicious users to conduct script insertion attacks. + Input passed as the filename for the uploaded file in bug_report.php is not properly sanitised before being stored. This can be exploited to insert arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when the malicious filename is viewed in view.php. + Successful exploitation requires valid user credentials.</desc> + </fsa> + <fsa> <id>355</id> <date>2008-01-21</date> <author>voroskoi</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
