* Pierre Chifflier:

> That looks serious indeed, and it affects versions from both testing and
> unstable.
>
> There are 3 different kind of problems:
> - Cross Site Scripting (unsafe usage of the PHP_SELF server variable
>   within the getParameterisedSelfUrl() function)
> - File handling issues in the RSS functionality
> - PHP Code Execution (only in 1.x branch): unsafe use of preg_replace
>   evaluation when parsing anchor tags and the like
>
> Unfortunately, upstream is not responsive :/ I have tried to contact Tim
> Armes, and the developer list.

If upstream is dead, I wonder if we should release with this package.
OTOH, it's used by Alioth, so we need to provide security support
anyway.

> The problems are affecting several parts of the code, and I am not sure
> what the correct solution could be.

Well, first of all, you need to understand what the bugs are.  For
instance, I think the third bug is less critical than it looks because
you need to commit something to the repository in order to exploit it.

After that, we can decide on a fix.  For the third bug, it's probably
best to remove the vulnerable code altogether (like upstream did for
the 2.0 release).  The feature doesn't appear to be documented anyway.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to