aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorSergey Skvortsov <skv@FreeBSD.org>2010-11-03 15:45:50 +0000
committerSergey Skvortsov <skv@FreeBSD.org>2010-11-03 15:45:50 +0000
commitd1b28660ca2c3f0f0d14d6d70cb6311c5ac76ed4 (patch)
tree3e10cf97a1fd4422150eaa9ded852bacd2c002cb /security/vuxml
parentce800d8632419b939b49cc4d032e53dd8ea99757 (diff)
downloadports-d1b28660ca2c3f0f0d14d6d70cb6311c5ac76ed4.tar.gz
ports-d1b28660ca2c3f0f0d14d6d70cb6311c5ac76ed4.zip
Document "otrs" - multiple XSS and denial of service vulnerabilities.
Notes
Notes: svn path=/head/; revision=263979
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml49
1 files changed, 49 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d5d6e0d18db3..fa2d636f7580 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,55 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="96e776c7-e75c-11df-8f26-00151735203a">
+ <topic>OTRS -- Multiple XSS and denial of service vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>otrs</name>
+ <range><gt>2.3.*</gt><lt>2.4.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>OTRS Security Advisory reports:</p>
+ <blockquote cite="http://otrs.org/advisory/OSA-2010-02-en/">
+ <ul>
+ <li>Multiple Cross Site Scripting issues:
+ Missing HTML quoting allows authenticated agents or
+ customers to inject HTML tags. This vulnerability
+ allows an attacker to inject script code into the OTRS
+ web-interface which will be loaded and executed
+ in the browsers of system users.</li>
+ <li>Possible Denial of Service Attack:
+ Perl's regular expressions consume 100% CPU time
+ on the server if an agent or customer views an affected
+ article. To exploit this vulnerability the malicious user
+ needs to send extremely large HTML emails to your
+ system address.</li>
+ </ul>
+ </blockquote>
+ <blockquote cite="http://otrs.org/advisory/OSA-2010-03-en/">
+ <p>AgentTicketZoom is vulnerable to XSS attacks from HTML e-mails:</p>
+ <p>Whenever a customer sends an HTML e-mail and RichText is enabled
+ in OTRS, javascript contained in the email can do everything
+ in the OTRS agent interface that the agent himself could do.</p>
+ <p>Most relevant is that this type of exploit can be used in such
+ a way that the agent won't even detect he is being exploited.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2010-2080</cvename>
+ <cvename>CVE-2010-4071</cvename>
+ <url>http://otrs.org/advisory/OSA-2010-02-en/</url>
+ <url>http://otrs.org/advisory/OSA-2010-03-en/</url>
+ </references>
+ <dates>
+ <discovery>2010-09-15</discovery>
+ <entry>2010-11-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="c223b00d-e272-11df-8e32-000f20797ede">
<topic>mozilla -- Heap buffer overflow mixing document.write and DOM insertion</topic>
<affects>