diff options
author | Sergey Skvortsov <skv@FreeBSD.org> | 2010-11-03 15:45:50 +0000 |
---|---|---|
committer | Sergey Skvortsov <skv@FreeBSD.org> | 2010-11-03 15:45:50 +0000 |
commit | d1b28660ca2c3f0f0d14d6d70cb6311c5ac76ed4 (patch) | |
tree | 3e10cf97a1fd4422150eaa9ded852bacd2c002cb /security/vuxml | |
parent | ce800d8632419b939b49cc4d032e53dd8ea99757 (diff) | |
download | ports-d1b28660ca2c3f0f0d14d6d70cb6311c5ac76ed4.tar.gz ports-d1b28660ca2c3f0f0d14d6d70cb6311c5ac76ed4.zip |
Document "otrs" - multiple XSS and denial of service vulnerabilities.
Notes
Notes:
svn path=/head/; revision=263979
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d5d6e0d18db3..fa2d636f7580 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,55 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="96e776c7-e75c-11df-8f26-00151735203a"> + <topic>OTRS -- Multiple XSS and denial of service vulnerabilities</topic> + <affects> + <package> + <name>otrs</name> + <range><gt>2.3.*</gt><lt>2.4.9</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>OTRS Security Advisory reports:</p> + <blockquote cite="http://otrs.org/advisory/OSA-2010-02-en/"> + <ul> + <li>Multiple Cross Site Scripting issues: + Missing HTML quoting allows authenticated agents or + customers to inject HTML tags. This vulnerability + allows an attacker to inject script code into the OTRS + web-interface which will be loaded and executed + in the browsers of system users.</li> + <li>Possible Denial of Service Attack: + Perl's regular expressions consume 100% CPU time + on the server if an agent or customer views an affected + article. To exploit this vulnerability the malicious user + needs to send extremely large HTML emails to your + system address.</li> + </ul> + </blockquote> + <blockquote cite="http://otrs.org/advisory/OSA-2010-03-en/"> + <p>AgentTicketZoom is vulnerable to XSS attacks from HTML e-mails:</p> + <p>Whenever a customer sends an HTML e-mail and RichText is enabled + in OTRS, javascript contained in the email can do everything + in the OTRS agent interface that the agent himself could do.</p> + <p>Most relevant is that this type of exploit can be used in such + a way that the agent won't even detect he is being exploited.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2010-2080</cvename> + <cvename>CVE-2010-4071</cvename> + <url>http://otrs.org/advisory/OSA-2010-02-en/</url> + <url>http://otrs.org/advisory/OSA-2010-03-en/</url> + </references> + <dates> + <discovery>2010-09-15</discovery> + <entry>2010-11-03</entry> + </dates> + </vuln> + <vuln vid="c223b00d-e272-11df-8e32-000f20797ede"> <topic>mozilla -- Heap buffer overflow mixing document.write and DOM insertion</topic> <affects> |