Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140129063017.GA9779@lorien.valinor.li>
Date: Wed, 29 Jan 2014 07:30:17 +0100
From: Salvatore Bonaccorso <carnil@...ian.org>
To: OSS Security Mailinglist <oss-security@...ts.openwall.com>
Cc: 736969@...s.debian.org
Subject: (possible) CVE request: suPHP 0.7.2 release fixed a possible
 arbitrary code execution

Hi

I do not have a commit reference for this: suPHP 0.7.2 release fixed a
security ssue that was introduced with the 0.7.0 release. From
Upstream[1]:

----cut---------cut---------cut---------cut---------cut---------cut-----
suPHP 0.7.2 has been released.
This release fixes a security issue that was introduced with the 0.7.0
release. This issue affected the source-highlighting feature and could
only be exploited, if the suPHP_PHPPath option was set. In this case
local users which could create or edit .htaccess files could possibly
execute arbitrary code with the privileges of the user the webserver
was running as.
----cut---------cut---------cut---------cut---------cut---------cut-----

Does this have already a CVE and/or should one be assigned?

suPHP is furthermore not anymore maintained upstream, see [3].

 [1] http://www.suphp.org/Home.html
 [2] http://bugs.debian.org/736969
 [3] https://lists.marsching.com/pipermail/suphp/2013-May/002554.html

Regards,
Salvatore

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.