Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE in MarkDown format #91

Open
wants to merge 2 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
85 changes: 0 additions & 85 deletions content/security/cves/CVE-2012-5639.html

This file was deleted.

39 changes: 39 additions & 0 deletions content/security/cves/CVE-2012-5639.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
type=cve
cve=CVE-2012-5639
cvedesc=Loading internal / external resource without warning.
cvefixed=4.1.15
tags=weekly links, java
status=published
~~~~~~

**Description**

In Apache OpenOffice and LibreOffice embedded content will be opened automatically without that a warning is shown.

**Severity: Moderate**

There are no known exploits of this vulnerability.
A proof-of-concept demonstration exists.

Thanks to the reporter for discovering this issue.

**Vendor: The Apache Software Foundation**

**Versions Affected**

All Apache OpenOffice versions 4.1.14 and older are affected.
OpenOffice.org versions may also be affected.

**Mitigation**

Install Apache OpenOffice 4.1.15 for the latest maintenance and cumulative security fixes. Use the Apache OpenOffice [download page](https://www.openoffice.org/download/).

**Acknowledgements**

The Apache OpenOffice Security Team would like to thank Timo Warns and Joachim Mammele for discovering and reporting this issue.

**Further Information**

For additional information and assistance, consult the [Apache OpenOffice Community Forums](https://forum.openoffice.org/) or make requests to the [email protected] public mailing list.

The latest information on Apache OpenOffice security bulletins can be found at the [Bulletin Archive](https://www.openoffice.org/security/bulletin.html) page.
1 change: 1 addition & 0 deletions jbake.properties
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ markdown.extensions=ALL,-HARDWRAPS,+EXTRA,+KRAMDOWN
#template.tag.file=tags.gsp
#template.sitemap.file=sitemap.gsp
template.feed.file=feed.gsp
template.cve.file=cve.gsp
render.encoding=UTF-8
render.tags=false
render.sitemap=false
Expand Down
65 changes: 65 additions & 0 deletions templates/cve.gsp
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
<%
// from jbake - content.file, content.uri and content.body
// from page metadata - content.title and content.css
if ( content.file.endsWith(".html") || content.file.endsWith(".htm") ) {
// using content.body if html get content.header, content.bodytag, and content.extracted_body
include "html_extract.gsp"
}
// insert breadcrumbs and ssi logic
// using content.uri get content.breadcrumbs and content.ssi[]
include "breadcrumbs.gsp"
// using content.ssi[] get content.brand, content.topnav, content.leftnav and content.rightnav
include "ssi_paths.gsp"
// adjust css from markdown output
if (content.image_css || content.list_css) {
include "markdown_css.gsp";
}
%><!--#include virtual="/doctype.html" -->
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<% if (content.header) { %>
<link href="/css/ooo.css" rel="stylesheet" type="text/css">
${content.header}
<% } else { %>
<title>${content.cve}</title>
<link href="/css/ooo.css" rel="stylesheet" type="text/css">
<% if (content.css) { %>
<link href="${content.css}" rel="stylesheet" type="text/css">
<% } %>
<% if (content.css2) { %>
<link href="${content.css2}" rel="stylesheet" type="text/css">
<% } %>
<% } %>
<script src="https://www.apachecon.com/event-images/snippet.js"></script>
</head>
<body<% if (content.bodytag) { %>${content.bodytag}<% } %>>
<!--#include virtual="${content.brand}" -->
<div id="topbara">
<% if (content.topnav) { %><!--#include virtual="${content.topnav}" --><% } %>
<div id="breadcrumbsa">${content.breadcrumbs}</div>
</div>
<div id="clear"></div>
<% if (content.leftnav) { %><!--#include virtual="${content.leftnav}" --><% } %>
<% if (content.rightnav) { %><!--#include virtual="${content.rightnav}" --><% } %>
<div id="content">
<p><a href="https://www.cve.org/CVERecord?id=${content.cve}">${content.cve}</a></p>
<p><a href="https://www.openoffice.org/security/cves/${content.cve}.html">Apache OpenOffice Advisory</a></p>
<p style="text-align:center; font-size:largest">${content.cvedesc}</p>
<% if (content.cvefixed) { %><p style="text-align:center;
font-size:larger">Fixed in Apache OpenOffice ${content.cvefixed}</p><% } %>
<% if (content.extracted_body) { %>
${content.extracted_body}
<% } else { %>
${content.body}
<% } %>
<hr />
<p>
<a href="https://security.openoffice.org">Security Home</a>-&gt;
<a href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>-&gt;
<a href="https://www.openoffice.org/security/cves/${content.cve}.html">${content.cve}</a>
</p>
</div>
<!--#include virtual="/footer.html" -->
</body>
</html>