ALT-PU-2023-6202-1
Package itop updated to version 3.1.0.2-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2023-01072
Уязвимость компонента AbstractSessionListener программной платформы для разработки и управления веб-приложениями Symfony, позволяющая нарушителю получить доступ к сеансу пользователя
Modified: 2025-02-13
CVE-2022-24894
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony HTTP cache system, acts as a reverse proxy: It caches entire responses (including headers) and returns them to the clients. In a recent change in the `AbstractSessionListener`, the response might contain a `Set-Cookie` header. If the Symfony HTTP cache system is enabled, this response might bill stored and return to the next clients. An attacker can use this vulnerability to retrieve the victim's session. This issue has been patched and is available for branch 4.4.
- https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb
- https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb
- https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv
- https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv
- https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html
Modified: 2024-11-21
CVE-2022-31402
ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/webservices/export-v2.php.
- https://github.com/YavuzSahbaz/CVE-2022-31402/blob/main/iTop%203.0.1%20XSS%20Vulnerability
- https://github.com/YavuzSahbaz/CVE-2022-31402/blob/main/iTop%203.0.1%20XSS%20Vulnerability
- https://sourceforge.net/projects/itop/
- https://sourceforge.net/projects/itop/
- https://www.itophub.io/
- https://www.itophub.io/
Modified: 2024-11-21
CVE-2022-39261
Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.
- https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b
- https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b
- https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33
- https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33
- [debian-lts-announce] 20221011 [SECURITY] [DLA 3147-1] twig security update
- [debian-lts-announce] 20221011 [SECURITY] [DLA 3147-1] twig security update
- FEDORA-2022-d39b2a755b
- FEDORA-2022-d39b2a755b
- FEDORA-2022-4490a4772d
- FEDORA-2022-4490a4772d
- FEDORA-2022-9d8ee4a6de
- FEDORA-2022-9d8ee4a6de
- FEDORA-2022-c6fe3ebd94
- FEDORA-2022-c6fe3ebd94
- FEDORA-2022-73b9fb7a77
- FEDORA-2022-73b9fb7a77
- FEDORA-2022-1695454935
- FEDORA-2022-1695454935
- DSA-5248
- DSA-5248
- https://www.drupal.org/sa-core-2022-016
- https://www.drupal.org/sa-core-2022-016