oss-security - (possible) CVE request: suPHP 0.7.2 release fixed a possible arbitrary code execution

Openwall
Follow @Openwall on Twitter for new release announcements and other news [<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140129063017.GA9779@lorien.valinor.li>
Date: 2014年1月29日 07:30:17 +0100
From: Salvatore Bonaccorso <carnil@...ian.org>
To: OSS Security Mailinglist <oss-security@...ts.openwall.com>
Cc: 736969@...s.debian.org
Subject: (possible) CVE request: suPHP 0.7.2 release fixed a possible
 arbitrary code execution
Hi
I do not have a commit reference for this: suPHP 0.7.2 release fixed a
security ssue that was introduced with the 0.7.0 release. From
Upstream[1]:
----cut---------cut---------cut---------cut---------cut---------cut-----
suPHP 0.7.2 has been released.
This release fixes a security issue that was introduced with the 0.7.0
release. This issue affected the source-highlighting feature and could
only be exploited, if the suPHP_PHPPath option was set. In this case
local users which could create or edit .htaccess files could possibly
execute arbitrary code with the privileges of the user the webserver
was running as.
----cut---------cut---------cut---------cut---------cut---------cut-----
Does this have already a CVE and/or should one be assigned?
suPHP is furthermore not anymore maintained upstream, see [3].
 [1] http://www.suphp.org/Home.html
 [2] http://bugs.debian.org/736969
 [3] https://lists.marsching.com/pipermail/suphp/2013-May/002554.html
Regards,
Salvatore

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.

AltStyle によって変換されたページ (->オリジナル) /