Steffen Joeris wrote:

the following CVE (Common Vulnerabilities & Exposures) id was
published for mediamate.

CVE-2008-4796[0]:
| The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3
| and earlier allows remote attackers to execute arbitrary commands via
| shell metacharacters in https URLs.  NOTE: some of these details are
| obtained from third party information.

While it is a security hole, mediamate only uses Snoopy for user provided URLs for IMDB entries. AFAIK, IMDB does not provide an HTTPS interface which this vulnerability requires.

The extracted patch for Snoopy.class.php can be found here[1]. However
it would be much appreciated (and it is a release goal anyway), if
you could just depend on libphp-snoopy, instead of duplicating the code.
(Maybe you need to change some includes, I didn't check that).
That would make life much easier for the security team.

I'm currently working on a corrected packae.

Also, since the package is in stable (etch), I'd like to know in which way
the php library is invoked and how vulnerable to attacks the stable
version is. If it is severe enough, we should prepare a DSA, otherwise
an update could go through s-p-u.

See above. I don't see how this could normally be exploited in mediamate's case, s-p-u should be fine. I'll look into providing a corrected package for it as well.

--
Jamin W. Collins



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to