On Fri, Oct 24, 2008 at 10:27:09PM +0200, Florian Weimer wrote:
> * Luca Bruno:
> 
> > A full disclosure bulletin has been posted today, reporting various 
> > security vulnerabilities in websvn.
> 
> Thanks, I'm not sure if the source is in our public monitoring.
> 
> > The remote code execution should only affect etch version, while at a 
> > first glance the others are also still open in lenny/sid.
> 
> I think the code execution can only be exploited if you can commit to
> the repository, so this vulnerability is not critical.
> 
> 

Hi,

That looks serious indeed, and it affects versions from both testing and
unstable.

There are 3 different kind of problems:
- Cross Site Scripting (unsafe usage of the PHP_SELF server variable
  within the getParameterisedSelfUrl() function)
- File handling issues in the RSS functionality
- PHP Code Execution (only in 1.x branch): unsafe use of preg_replace
  evaluation when parsing anchor tags and the like

Unfortunately, upstream is not responsive :/ I have tried to contact Tim
Armes, and the developer list.

The problems are affecting several parts of the code, and I am not sure
what the correct solution could be.

Help on the subject would be very appreciated !

Pierre




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to