Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200705-16 ] PhpWiki: Remote execution of arbitrary code
Date: Thu, 17 May 2007 13:21:16
Message-Id: 20070517130349.GB14509@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200705-16
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: PhpWiki: Remote execution of arbitrary code
9 Date: May 17, 2007
10 Bugs: #174451
11 ID: 200705-16
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability has been discovered in PhpWiki allowing for the remote
19 execution of arbitrary code.
20
21 Background
22 ==========
23
24 PhpWiki is an open source content management system written in PHP.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 www-apps/phpwiki < 1.3.10-r3 >= 1.3.10-r3
33
34 Description
35 ===========
36
37 Harold Hallikainen has reported that the Upload page fails to properly
38 check the extension of a file.
39
40 Impact
41 ======
42
43 A remote attacker could upload a specially crafted PHP file to the
44 vulnerable server, resulting in the execution of arbitrary PHP code
45 with the privileges of the user running PhpWiki.
46
47 Workaround
48 ==========
49
50 There is no known workaround at this time.
51
52 Resolution
53 ==========
54
55 All PhpWiki users should upgrade to the latest version:
56
57 # emerge --sync
58 # emerge --ask --oneshot --verbose ">=www-apps/phpwiki-1.3.10-r3"
59
60 References
61 ==========
62
63 [ 1 ] CVE-2007-2024
64 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2024
65 [ 2 ] CVE-2007-2025
66 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2025
67
68 Availability
69 ============
70
71 This GLSA and any updates to it are available for viewing at
72 the Gentoo Security Website:
73
74 http://security.gentoo.org/glsa/glsa-200705-16.xml
75
76 Concerns?
77 =========
78
79 Security is a primary focus of Gentoo Linux and ensuring the
80 confidentiality and security of our users machines is of utmost
81 importance to us. Any security concerns should be addressed to
82 security@g.o or alternatively, you may file a bug at
83 http://bugs.gentoo.org.
84
85 License
86 =======
87
88 Copyright 2007 Gentoo Foundation, Inc; referenced text
89 belongs to its owner(s).
90
91 The contents of this document are licensed under the
92 Creative Commons - Attribution / Share Alike license.
93
94 http://creativecommons.org/licenses/by-sa/2.5