blob: f68b34646487e14ea00fdd0a3d372c7f3c69d2e0 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200507-03">
<title>phpBB: Arbitrary command execution</title>
A vulnerability in phpBB allows a remote attacker to execute arbitrary
commands with the rights of the web server.
<product type="ebuild">phpBB</product>
<announced>July 04, 2005</announced>
<revised>September 03, 2005: 03</revised>
<package name="www-apps/phpBB" auto="yes" arch="*">
<unaffected range="ge">2.0.16</unaffected>
<vulnerable range="lt">2.0.16</vulnerable>
phpBB is an Open Source bulletin board package.
Ron van Daal discovered that phpBB contains a vulnerability in the
highlighting code.
<impact type="high">
Successful exploitation would grant an attacker unrestricted access to
the PHP exec() or system() functions, allowing the execution of
arbitrary commands with the rights of the web server.
Please follow the instructions given in the phpBB announcement.
The phpBB package is no longer supported by Gentoo Linux and has been
masked in the Portage repository, no further announcements will be
issued regarding phpBB updates. Users who wish to continue using phpBB
are advised to monitor and refer to for more information.
To continue using the Gentoo-provided phpBB package, please refer to
the Portage documentation on unmasking packages and upgrade to 2.0.16.
<uri link="">CAN-2005-2086</uri>
<uri link=";t=302011">phpBB Announcement</uri>
<metadata tag="requester" timestamp="Wed, 29 Jun 2005 13:31:49 +0000">
<metadata tag="submitter" timestamp="Wed, 29 Jun 2005 14:18:11 +0000">
<metadata tag="bugReady" timestamp="Sat, 02 Jul 2005 09:31:28 +0000">