View | Details | Raw Unified | Return to bug 221539 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (+31 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="e154052b-819d-11e7-bf67-901b0ea1986f">
62
    <topic>py-supervisor -- An authenticated client can run arbitrary shell commands via malicious XML-RPC requests</topic>
63
    <affects>
64
      <package>
65
	<name>py-supervisor</name>
66
	<range><lt>3.3.3</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Supervisor Release Notes:</p>
72
	<blockquote cite="http://supervisord.org/changes.html#id1">
73
          <p>CVE-2017-11610</p>
74
          <p>A vulnerability was found where an authenticated client can send a
75
             malicious XML-RPC request to supervisord that will run arbitrary shell
76
             commands on the server. The commands will be run as the same user as
77
             supervisord. Depending on how supervisord has been configured, this
78
             may be root.</p>
79
	</blockquote>
80
      </body>
81
    </description>
82
    <references>
83
      <cvename>CVE-2017-11610</cvename>
84
      <url>http://supervisord.org/changes.html#id1</url>
85
    </references>
86
    <dates>
87
      <discovery>2017-07-24</discovery>
88
      <entry>2017-08-15</entry>
89
    </dates>
90
  </vuln>
91
61
  <vuln vid="79bbec7e-8141-11e7-b5af-a4badb2f4699">
92
  <vuln vid="79bbec7e-8141-11e7-b5af-a4badb2f4699">
62
    <topic>FreeRadius -- Multiple vulnerabilities</topic>
93
    <topic>FreeRadius -- Multiple vulnerabilities</topic>
63
    <affects>
94
    <affects>

Return to bug 221539