aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorbdrewery <bdrewery@FreeBSD.org>2013-07-22 21:24:05 +0800
committerbdrewery <bdrewery@FreeBSD.org>2013-07-22 21:24:05 +0800
commit188fa293ca59279ab8697813cfa07a682f2a6f0d (patch)
tree89fe0bee0855d1cf51d856705818586e043f9826 /security/vuxml
parent5f338126adac9b9c498bf6c5a82966289f04f425 (diff)
downloadfreebsd-ports-gnome-188fa293ca59279ab8697813cfa07a682f2a6f0d.tar.gz
freebsd-ports-gnome-188fa293ca59279ab8697813cfa07a682f2a6f0d.tar.zst
freebsd-ports-gnome-188fa293ca59279ab8697813cfa07a682f2a6f0d.zip
- Update suPHP to 0.7.2
- Document possible privilege escalation Approved by: maintainer timeout Security: 2fbfd455-f2d0-11e2-8a46-000d601460a4
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml36
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 2226e8b61a89..fc098cba3542 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,42 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="2fbfd455-f2d0-11e2-8a46-000d601460a4">
+ <topic>suPHP -- Privilege escalation</topic>
+ <affects>
+ <package>
+ <name>suphp</name>
+ <range><lt>0.7.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>suPHP developer Sebastian Marsching reports:</p>
+ <blockquote cite="https://lists.marsching.com/pipermail/suphp/2013-May/002552.html">
+ <p>When the suPHP_PHPPath was set, mod_suphp would use the specified PHP
+ executable to pretty-print PHP source files (MIME type
+ x-httpd-php-source or application/x-httpd-php-source).
+
+ However, it would not sanitize the environment. Thus a user that was
+ allowed to use the SetEnv directive in a .htaccess file (AllowOverride
+ FileInfo) could make PHP load a malicious configuration file (e.g.
+ loading malicious extensions).
+
+ As the PHP process for highlighting the source file was run with the
+ privileges of the user Apache HTTPd was running as, a local attacker
+ could probably execute arbitrary code with the privileges of this user.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://lists.marsching.com/pipermail/suphp/2013-May/002552.html</url>
+ </references>
+ <dates>
+ <discovery>2013-05-20</discovery>
+ <entry>2013-07-22</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ca4d63fb-f15c-11e2-b183-20cf30e32f6d">
<topic>apache24 -- several vulnerabilities</topic>
<affects>