oss-sec mailing list archives
(possible) CVE request: suPHP 0.7.2 release fixed a possible arbitrary code execution
From: Salvatore Bonaccorso <carnil () debian org>
Date: Wed, 29 Jan 2014 07:30:17 +0100
Hi I do not have a commit reference for this: suPHP 0.7.2 release fixed a security ssue that was introduced with the 0.7.0 release. From Upstream[1]: ----cut---------cut---------cut---------cut---------cut---------cut----- suPHP 0.7.2 has been released. This release fixes a security issue that was introduced with the 0.7.0 release. This issue affected the source-highlighting feature and could only be exploited, if the suPHP_PHPPath option was set. In this case local users which could create or edit .htaccess files could possibly execute arbitrary code with the privileges of the user the webserver was running as. ----cut---------cut---------cut---------cut---------cut---------cut----- Does this have already a CVE and/or should one be assigned? suPHP is furthermore not anymore maintained upstream, see [3]. [1] http://www.suphp.org/Home.html [2] http://bugs.debian.org/736969 [3] https://lists.marsching.com/pipermail/suphp/2013-May/002554.html Regards, Salvatore
Current thread:
- (possible) CVE request: suPHP 0.7.2 release fixed a possible arbitrary code execution Salvatore Bonaccorso (Jan 28)