diff options
author | Danilo G. Baio <dbaio@FreeBSD.org> | 2020-10-17 13:50:26 +0000 |
---|---|---|
committer | Danilo G. Baio <dbaio@FreeBSD.org> | 2020-10-17 13:50:26 +0000 |
commit | f60f1eed8a594f2464f079d9bfd21a8bd6186b1a (patch) | |
tree | 02a38b2ab4d9da28df9193311c45739822abb476 /security | |
parent | e82d5816551b4707cedd3d6a5239af4f406310c5 (diff) | |
download | ports-f60f1eed8a594f2464f079d9bfd21a8bd6186b1a.tar.gz ports-f60f1eed8a594f2464f079d9bfd21a8bd6186b1a.zip |
security/vuxml: Document net-im/py-matrix-synapse issue
PR: 249948
Submitted by: Sascha Biberhofer <ports@skyforge.at>
Security: CVE-2020-26891
Notes
Notes:
svn path=/head/; revision=552574
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 95e9b8adc9e9..60fdda5f1364 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,41 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="5f39d80f-107c-11eb-8b47-641c67a117d8"> + <topic>py-matrix-synapse -- XSS vulnerability</topic> + <affects> + <package> + <name>py36-matrix-synapse</name> + <name>py37-matrix-synapse</name> + <name>py38-matrix-synapse</name> + <name>py39-matrix-synapse</name> + <range><lt>1.21.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Matrix developers reports:</p> + <blockquote cite="https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5rmq"> + <p>The fallback authentication endpoint served via Synapse were vulnerable + to cross-site scripting (XSS) attacks. The impact depends on the + configuration of the domain that Synapse is deployed on, but may allow + access to cookies and other browser data, CSRF vulnerabilities, and + access to other resources served on the same domain or parent domains.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-26891</cvename> + <url>https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5rmq</url> + <url>https://github.com/matrix-org/synapse/releases/tag/v1.21.2</url> + <freebsdpr>ports/249948</freebsdpr> + </references> + <dates> + <discovery>2020-10-01</discovery> + <entry>2020-10-16</entry> + </dates> + </vuln> + <vuln vid="95d9d986-1078-11eb-ab74-4c72b94353b5"> <topic>drupal -- Multiple Vulnerabilities</topic> <affects> |