Gentoo Archives: gentoo-announce

From: "Christopher Díaz Riveros" <chrisadr@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201711-15 ] PHPUnit: Remote code execution
Date: Sun, 19 Nov 2017 20:48:15
Message-Id: 1511124433.29347.53.camel@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory                           GLSA 201711-15
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4                                            https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7  Severity: Normal
8     Title: PHPUnit: Remote code execution
9      Date: November 19, 2017
10      Bugs: #635356
11        ID: 201711-15
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability was discovered in PHPUnit which may allow an
19 unauthenticated remote attacker to execute arbitrary PHP code.
20
21 Background
22 ==========
23
24 PHPUnit is a programmer-oriented testing framework for PHP. It is an
25 instance of the xUnit architecture for unit testing frameworks.
26
27 Affected packages
28 =================
29
30     -------------------------------------------------------------------
31      Package              /     Vulnerable     /            Unaffected
32     -------------------------------------------------------------------
33   1  dev-php/phpunit            < 5.7.15-r1              >= 5.7.15-r1 
34
35 Description
36 ===========
37
38 When PHPUnit is installed in a production environment via composer and
39 these modules are in a web accessible directory, the eval-stdin.php
40 file in PHPUnit contains vulnerable statements that trigger the
41 vulnerability.
42
43 Impact
44 ======
45
46 A remote attacker could possibly execute arbitrary PHP code or cause a
47 Denial of Service condition.
48
49 Workaround
50 ==========
51
52 There are several ways to fix or mitigate this vulnerability:
53
54 Remove PHPUnit from the production environment.
55
56 Update PHPUnit.
57
58 Manually apply the patch.
59
60 Disable direct access to the composer packages by placing .htaccess
61 file to /vendor folder.
62
63 Resolution
64 ==========
65
66 All PHPUnit users should upgrade to the latest version:
67
68   # emerge --sync
69   # emerge --ask --oneshot --verbose ">=dev-php/phpunit-5.7.15-r1"
70
71 References
72 ==========
73
74 [ 1 ] CVE-2017-9841
75       https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9841
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83  https://security.gentoo.org/glsa/201711-15
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users' machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 https://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2017 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature