summaryrefslogtreecommitdiff
blob: 83e2b8213065867d8c115e2074410eea7b7c36b7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200605-04">
  <title>phpWebSite: Local file inclusion</title>
  <synopsis>
    Remote attackers can include local files which may lead to the execution of
    arbitrary code.
  </synopsis>
  <product type="ebuild">phpwebsite</product>
  <announced>2006-05-02</announced>
  <revised count="01">2006-05-02</revised>
  <bug>130295</bug>
  <access>remote</access>
  <affected>
    <package name="www-apps/phpwebsite" auto="yes" arch="*">
      <unaffected range="ge">0.10.2</unaffected>
      <vulnerable range="lt">0.10.2</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    phpWebSite provides a complete web site content management system.
    </p>
  </background>
  <description>
    <p>
    rgod has reported that the "hub_dir" parameter in "index.php"
    isn't properly verified. When "magic_quotes_gpc" is disabled, this can
    be exploited to include arbitrary files from local ressources.
    </p>
  </description>
  <impact type="normal">
    <p>
    If "magic_quotes_gpc" is disabled, which is not the default on
    Gentoo Linux, a remote attacker could exploit this issue to include and
    execute PHP scripts from local ressources with the rights of the user
    running the web server, or to disclose sensitive information and
    potentially compromise a vulnerable system.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All phpWebSite users should upgrade to the latest available
    version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwebsite-0.10.2"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1819">CVE-2006-1819</uri>
  </references>
  <metadata tag="requester" timestamp="2006-05-01T10:33:24Z">
    falco
  </metadata>
  <metadata tag="submitter" timestamp="2006-05-01T10:58:55Z">
    falco
  </metadata>
  <metadata tag="bugReady" timestamp="2006-05-01T11:02:34Z">
    falco
  </metadata>
</glsa>