Your message dated Sat, 29 Sep 2007 17:18:25 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#441390: fixed in phpwiki 1.3.14-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: phpwiki
Severity: serious
Version: 1.3.12p3-5
Tags: security patch
Hi,
The following has been reported:
CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability in
the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows
remote attackers to upload arbitrary PHP files with a double extension, as
demonstrated by .php.3, which is interpreted by Apache as being a valid
PHP file.
The patch is attached. I'm already preparing an NMU as per your permission in
#429201.
Thanks!
Thijs
diff -ur phpwiki-1.3.12p3.orig/lib/plugin/UpLoad.php phpwiki-1.3.12p3/lib/plugin/UpLoad.php
--- phpwiki-1.3.12p3.orig/lib/plugin/UpLoad.php 2006-06-18 13:19:23.000000000 +0200
+++ phpwiki-1.3.12p3/lib/plugin/UpLoad.php 2007-09-09 13:37:48.000000000 +0200
@@ -136,7 +136,7 @@
$userfile_name = trim(basename($userfile_name));
$userfile_tmpname = $userfile->getTmpName();
$err_header = HTML::h2(fmt("ERROR uploading '%s': ", $userfile_name));
- if (preg_match("/(\." . join("|\.", $this->disallowed_extensions) . ")\$/",
+ if (preg_match("/(\." . join("|\.", $this->disallowed_extensions) . ")(\.|\$)/i",
$userfile_name))
{
$message->pushContent($err_header);
pgpQI1hqvRcMu.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: phpwiki
Source-Version: 1.3.14-1
We believe that the bug you reported is fixed in the latest version of
phpwiki, which is due to be installed in the Debian FTP archive:
phpwiki_1.3.14-1.diff.gz
to pool/main/p/phpwiki/phpwiki_1.3.14-1.diff.gz
phpwiki_1.3.14-1.dsc
to pool/main/p/phpwiki/phpwiki_1.3.14-1.dsc
phpwiki_1.3.14-1_all.deb
to pool/main/p/phpwiki/phpwiki_1.3.14-1_all.deb
phpwiki_1.3.14.orig.tar.gz
to pool/main/p/phpwiki/phpwiki_1.3.14.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Matt Brown <[EMAIL PROTECTED]> (supplier of updated phpwiki package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sat, 29 Sep 2007 17:15:07 +0100
Source: phpwiki
Binary: phpwiki
Architecture: source all
Version: 1.3.14-1
Distribution: unstable
Urgency: high
Maintainer: Matt Brown <[EMAIL PROTECTED]>
Changed-By: Matt Brown <[EMAIL PROTECTED]>
Description:
phpwiki - informal collaborative website manager
Closes: 416796 418571 418577 424607 429201 438785 439104 441390 441936 444201
Changes:
phpwiki (1.3.14-1) unstable; urgency=low
.
* New upstream release 1.3.14
* Contains fixes for CVE-2007-3193, CVE-2007-2024 and CVE-2007-2025,
fixed in NMU by Thijs Kinkhorst. Thanks.
* Remove patches merged upstream
- 03-dba-open-existing
- 07-versiondata-base64-decode
- 08-upgrade-remove-user-table
- 09-upgrade-sql-syntax-fixes
- 10-upgrade-password-portable
- 11-upgrade-sqlite-nopass
* Drop PHP4 support, add missing libapache2-mod-php5 dependency.
(Closes: #438785)
* Add Depend on debconf-2.0 for cdebconf support. (Closes: #441936)
* Fix debconf template errors. Thanks to Helge Kreutzmann. (Closes: #418571)
* New translations:
- pt thanks Ricardo Silva (Closes: #416796)
- de thanks to Helge Kreutzmann (Closes: #418577)
* Updated es translation thanks to Carlos Galisteo (Closes: #424607)
* MonoBook theme tested and working OK. (Closes: #444201)
* Symlink schemas from dbconfig-common directory to documented locations.
(Closes: #439104)
.
phpwiki (1.3.12p3-6.1) unstable; urgency=high
.
* NMU by the testing security team, with maintainer approval.
* CVE-2007-3193: lib/WikiUser/LDAP.php in PhpWiki before 1.3.13p1, when the
configuration lacks a nonzero PASSWORD_LENGTH_MINIMUM, might allow remote
attackers to bypass authentication via an empty password, which causes
ldap_bind to return true when used with certain LDAP implementations.
(Closes: #429201)
* CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability in
the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows
remote attackers to upload arbitrary PHP files with a double extension, as
demonstrated by .php.3, which is interpreted by Apache as being a valid
PHP file.
(Closes: #441390)
Files:
04347ac8719d2738f972d67d4e3171b3 632 web optional phpwiki_1.3.14-1.dsc
e6f747756c5534a5ba4d3775098997e0 3388499 web optional
phpwiki_1.3.14.orig.tar.gz
54a3ca637dfb2e959274b7b6767e47d1 52505 web optional phpwiki_1.3.14-1.diff.gz
7b6cc548048a0a20c8e37084ee4e906b 3203712 web optional phpwiki_1.3.14-1_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFG/oXz/pqN2EBUqwgRArDCAJ9C83t4D/nCDENMZyoqIfCcKl4g+wCfeWbT
ejDc30ejG8m2Uw8dDisw0lw=
=Axg9
-----END PGP SIGNATURE-----
--- End Message ---