aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln-2021.xml
diff options
context:
space:
mode:
authorDon Lewis <truckman@FreeBSD.org>2021-12-21 23:39:08 +0000
committerDon Lewis <truckman@FreeBSD.org>2021-12-21 23:41:14 +0000
commit49ba7b28f0d0c74eaca815b6c54efc115d66b0d4 (patch)
tree3e683a9bd763f92c0b5ba05ec70210c25107685f /security/vuxml/vuln-2021.xml
parenta6764c084deae36c15180623f582bd77c23fb6d1 (diff)
downloadports-49ba7b28f0d0c74eaca815b6c54efc115d66b0d4.tar.gz
ports-49ba7b28f0d0c74eaca815b6c54efc115d66b0d4.zip
security/vuxml: Document opengrok RCE CVE-2021-2322
Diffstat (limited to 'security/vuxml/vuln-2021.xml')
-rw-r--r--security/vuxml/vuln-2021.xml28
1 files changed, 28 insertions, 0 deletions
diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index 05b88cde90cf..cf52dabf0dcd 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -1,3 +1,31 @@
+ <vuln vid="1135e939-62b4-11ec-b8e2-1c1b0d9ea7e6">
+ <topic>opengrok -- Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok.</topic>
+ <affects>
+ <package>
+ <name>opengrok</name>
+ <range><le>1.6.7</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Bobby Rauch of Accenture reports:</p>
+ <blockquote cite="https://medium.com/@bobbyrsec/oracle-opengrok-rce-cve-2021-2322-a284e5621bfe">
+ <p>I ended up finding OpenGrok, and after careful testing, discovered that OpenGrok insecurely deserializes XML input, which can lead to Remote Code Execution. This vulnerability was found in all versions of OpenGrok &lt;1.6.8 and was reported to Oracle. The vulnerability has now been patched in OpenGrok 1.6.9, and has been issued a CVE. (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2322)</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-2322</cvename>
+ <url>https://www.oracle.com/security-alerts/oracle-open-source-cves-outside-other-oracle-public-documents.html</url>
+ <url>https://www.oracle.com/security-alerts/oracle-open-source-cves-outside-other-oracle-public-documents.html</url>
+ <url>https://github.com/oracle/opengrok/pull/3528</url>
+ </references>
+ <dates>
+ <discovery>2021-04-07</discovery>
+ <entry>2021-12-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="0a50bb48-625f-11ec-a1fb-080027cb2f6f">
<topic>mediawiki -- multiple vulnerabilities</topic>
<affects>