Mageia alert MGASA-2016-0044 (cakephp)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2016-0044: Updated cakephp package fixes security vulnerability | |
Date: | Fri, 5 Feb 2016 18:26:45 +0100 | |
Message-ID: | <20160205172645.47B7B21BE3B@valstar.mageia.org> |
MGASA-2016-0044 - Updated cakephp package fixes security vulnerability Publication date: 05 Feb 2016 URL: http://advisories.mageia.org/MGASA-2016-0044.html Type: security Affected Mageia releases: 5 Description: CakePHP, an open-source web application framework for PHP, was vulnerable to SSRF (Server Side Request Forgery) attacks. Remote attacker can utilize it for at least DoS (Denial of Service) attacks, if the target application accepts XML as an input. It is caused by insecure design of Cake's Xml class. References: - https://bugs.mageia.org/show_bug.cgi?id=17003 - http://lwn.net/Alerts/661886/ SRPMS: - 5/core/cakephp-1.3.21-2.mga5