Bug#661020: acidbase: CVE-2012-1198 security bypass and remote file inclusion

2014-11-14 Thread Thijs Kinkhorst
severity 661020 normal
thanks

Hi,

 From what I see the remote file inclusion is limited to environments with
 register_globals being on though.

I've investigated this issue. The vast majority of the mentioned 'attacks'
evidently only possible through register_globals, and the one about
'create' is very vague and not reproducible for me.

register_globals is in 2014 no longer anything that anyone should still be
running, and is explicitly marked as unsupported for many releases now.
Add to this that these kinds of tools are not normally operated by
untrusted users or exposed to the internet.

I'm downgrading the bug for now. It would be nice if the maintainer could
comment on it.


Cheers,
Thijs


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#661020: acidbase: CVE-2012-1198 security bypass and remote file inclusion

2013-05-18 Thread Jonathan Wiltshire
Package: src:acidbase

Dear maintainer,

Recently you fixed one or more security problems and as a result you closed
this bug. These problems were not serious enough for a Debian Security
Advisory, so they are now on my radar for fixing in the following suites
through point releases:

squeeze (6.0.8) - use target oldstable

Please prepare a minimal-changes upload targetting each of these suites,
and submit a debdiff to the Release Team [0] for consideration. They will
offer additional guidance or instruct you to upload your package.

I will happily assist you at any stage if the patch is straightforward and
you need help. Please keep me in CC at all times so I can
track [1] the progress of this request.

For details of this process and the rationale, please see the original
announcement [2] and my blog post [3].

0: debian-rele...@lists.debian.org
1: http://prsc.debian.net/tracker/661020/
2: 201101232332.11736.th...@debian.org
3: http://deb.li/prsc

Thanks,

with his security hat on:
--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#661020: acidbase: CVE-2012-1198 security bypass and remote file inclusion

2012-02-23 Thread Nico Golde
Source: acidbase
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for acidbase.

CVE-2012-1198[0]:
| base_ag_main.php in Basic Analysis and Security Engine (BASE) 1.4.5
| allows remote attackers to execute arbitrary code by uploading
| contents of the file with an executable extension via a create action,
| then accessing it via a view action.

From what I see the remote file inclusion is limited to environments with 
register_globals being on though.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1198
http://security-tracker.debian.org/tracker/CVE-2012-1198

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.


pgpA1VUtg9uUe.pgp
Description: PGP signature