blob: e3f89cea1cd49d77f7471e52d4dec092530bfdc2 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200605-04">
<title>phpWebSite: Local file inclusion</title>
<synopsis>
Remote attackers can include local files which may lead to the execution of
arbitrary code.
</synopsis>
<product type="ebuild">phpwebsite</product>
<announced>May 02, 2006</announced>
<revised>May 02, 2006: 01</revised>
<bug>130295</bug>
<access>remote</access>
<affected>
<package name="www-apps/phpwebsite" auto="yes" arch="*">
<unaffected range="ge">0.10.2</unaffected>
<vulnerable range="lt">0.10.2</vulnerable>
</package>
</affected>
<background>
<p>
phpWebSite provides a complete web site content management system.
</p>
</background>
<description>
<p>
rgod has reported that the "hub_dir" parameter in "index.php"
isn't properly verified. When "magic_quotes_gpc" is disabled, this can
be exploited to include arbitrary files from local ressources.
</p>
</description>
<impact type="normal">
<p>
If "magic_quotes_gpc" is disabled, which is not the default on
Gentoo Linux, a remote attacker could exploit this issue to include and
execute PHP scripts from local ressources with the rights of the user
running the web server, or to disclose sensitive information and
potentially compromise a vulnerable system.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All phpWebSite users should upgrade to the latest available
version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwebsite-0.10.2&quot;</code>
</resolution>
<references>
<uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1819">CVE-2006-1819</uri>
</references>
<metadata tag="requester" timestamp="Mon, 01 May 2006 10:33:24 +0000">
falco
</metadata>
<metadata tag="submitter" timestamp="Mon, 01 May 2006 10:58:55 +0000">
falco
</metadata>
<metadata tag="bugReady" timestamp="Mon, 01 May 2006 11:02:34 +0000">
falco
</metadata>
</glsa>