Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=8e1880e343daf197a54f8ec32da3729d3e98e639

commit 8e1880e343daf197a54f8ec32da3729d3e98e639
Author: Miklos Vajna <[email protected]>
Date:   Mon Mar 1 20:22:23 2010 +0100

FSA627-drupal-webform

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 85e3116..7d29594 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,21 @@

<fsas>
<fsa>
+               <id>627</id>
+               <date>2010-03-01</date>
+               <author>Miklos Vajna</author>
+               <package>drupal-webform</package>
+               <vulnerable>5.x_2.7-1</vulnerable>
+               <unaffected>5.x_2.8-1getorin1</unaffected>
+               <bts>http://bugs.frugalware.org/task/4000</bts>
+               <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=4532
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4533</cve>
+               <desc>Some vulnerabilities have been reported in the Webform 
module for Drupal, which can be exploited by malicious users to conduct script 
insertion attacks, and by malicious people to disclose potentially sensitive 
information.
+                       1) Input passed to field labels while creating new 
webforms is not properly sanitised before being used. This can be exploited to 
insert arbitrary HTML and script code, which will be executed in a user's 
browser session in context of an affected site when the malicious data is being 
viewed.
+                       Successful exploitation of this vulnerability requires 
permissions to create webforms.
+                       2) An error in the handling of cached pages can be 
exploited to disclose session variables when caching is enabled.</desc>
+       </fsa>
+       <fsa>
<id>626</id>
<date>2010-03-01</date>
<author>Miklos Vajna</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to