Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAOupQd1AL9UfANeEFwuHnW8=cG84xM0ybcm31NEFgp7F=eKqkQ@mail.gmail.com>
Date: Wed, 3 Jun 2015 07:42:05 -0500
From: Dennis <shr3kst3r@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: mime-support

Sorry, I should have put an affected version in the request: Debian
derivatives running mime-support less then 3.52-1.

-- Dennis

On Wed, Jun 3, 2015 at 7:35 AM, Dennis <shr3kst3r@...il.com> wrote:

> Hi,
>
> This bug https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=589384
> deserves a CVE.  Basically, in the default configuration of apache +
> mod_php + mod_mime, files like test.php.blah will be executed as PHP code.
> The expected behavior is that only test.php will be executed as PHP.  Yes,
> it was fixed 5 years ago, but I am seeing it actively utilized against
> Ubuntu 12.04 (which did not get the fix), specifically against Wordpress
> plugins that allow file uploads.
>
> Thanks,
> Dennis
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.