Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=9f2c8cb6444697dc32b8888f3d20ec66f8a14978

commit 9f2c8cb6444697dc32b8888f3d20ec66f8a14978
Author: Miklos Vajna <[email protected]>
Date:   Sun Jul 26 13:41:29 2009 +0200

FSA614-drupal6-img_assist

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 8663ddf..6f92103 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,19 @@

<fsas>
<fsa>
+               <id>614</id>
+               <date>2009-07-26</date>
+               <author>Miklos Vajna</author>
+               <package>drupal6-img_assist</package>
+               <vulnerable>6.x_1.0-1</vulnerable>
+               <unaffected>6.x_1.1-1anacreon1</unaffected>
+               <bts>http://bugs.frugalware.org/task/3876</bts>
+               <cve>No CVE references, see http://drupal.org/node/520564</cve>
+               <desc>Some vulnerabilities have been reported in the Image 
Assist module for Drupal, which can be exploited by malicious users to conduct 
script insertion attacks or to disclose potentially sensitive information.
+                       1) Input passed to the node title is not properly 
sanitised before being used. This can be exploited to insert arbitrary HTML and 
script code, which will be executed in a user's browser session in context of 
an affected site when the malicious data is viewed.
+                       2) Certain pages do not properly check the required 
access permissions, which can be exploited to view the title and body of 
arbitrary nodes.</desc>
+       </fsa>
+       <fsa>
<id>613</id>
<date>2009-07-26</date>
<author>Miklos Vajna</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to