Your message dated Fri, 11 Feb 2005 21:20:48 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294690: CAN-2005-0300: Directory traversal in JSBoard
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 11 Feb 2005 05:27:34 +0000
>From [EMAIL PROTECTED] Thu Feb 10 21:27:34 2005
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CzTL4-0001qv-00; Thu, 10 Feb 2005 21:27:34 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
        id C7F3A366B78; Fri, 11 Feb 2005 06:27:36 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
        from infodrom.org by finlandia.Infodrom.North.DE
        via smail from stdin
        id <[EMAIL PROTECTED]>
        for [EMAIL PROTECTED]; Fri, 11 Feb 2005 06:22:26 +0100 (CET) 
Date: Fri, 11 Feb 2005 06:22:26 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: CAN-2005-0300: Directory traversal in JSBoard
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
X-Debbugs-Cc: [EMAIL PROTECTED]
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: jsboard
Version: 2.0.10-2
Severity: grave
Tags: sarge sid security patch

Please fix the directory traversal vulnerability.

http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2

Details
=======
PHP has a feature discarding the input values containing null characters
when magic_quotes_gpc = off. Because JSBoard session.php doesn't sanitize
$table variable, a malicious attacker can read arbitrary files.

---
include_once "include/print.php";
parse_query_str();
$opt = $table ? "&table=$table" : "";
$opts = $table ? "?table=$table" : "";
...snip...
---

This is CAN-2005-0300
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0300

Reference: BUGTRAQ:20050120 STG Security Advisory: [SSA-20050120-22] JSBoard 
file disclosure
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2
Reference: BID:12319
Reference: URL:http://www.securityfocus.com/bid/12319
Reference: XF:jsboard-session-file-include(18990)
Reference: URL:http://xforce.iss.net/xforce/xfdb/18990

Regards,

        Joey

-- 
The good thing about standards is that there are so many to choose from.
                -- Andrew S. Tanenbaum

Please always Cc to me when replying to me on the lists.

---------------------------------------
Received: (at 294690-done) by bugs.debian.org; 11 Feb 2005 20:27:27 +0000
>From [EMAIL PROTECTED] Fri Feb 11 12:27:27 2005
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CzhNu-0000wS-00; Fri, 11 Feb 2005 12:27:27 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
        id EB8DF366B65; Fri, 11 Feb 2005 21:27:29 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
        from infodrom.org by finlandia.Infodrom.North.DE
        via smail from stdin
        id <[EMAIL PROTECTED]>
        for [EMAIL PROTECTED]; Fri, 11 Feb 2005 21:20:49 +0100 (CET) 
Date: Fri, 11 Feb 2005 21:20:48 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: Joey Hess <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Subject: Re: Bug#294690: CAN-2005-0300: Directory traversal in JSBoard
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Joey Hess wrote:
> > http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2
> > 
> > Details
> > =======
> > PHP has a feature discarding the input values containing null characters
> > when magic_quotes_gpc = off. Because JSBoard session.php doesn't sanitize
> > $table variable, a malicious attacker can read arbitrary files.
> > 
> > ---
> > include_once "include/print.php";
> > parse_query_str();
> > $opt = $table ? "&table=$table" : "";
> > $opts = $table ? "?table=$table" : "";
> > ...snip...
> > ---
> > 
> > This is CAN-2005-0300
> > URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0300
> > 
> > Reference: BUGTRAQ:20050120 STG Security Advisory: [SSA-20050120-22] 
> > JSBoard file disclosure
> > Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2
> > Reference: BID:12319
> > Reference: URL:http://www.securityfocus.com/bid/12319
> > Reference: XF:jsboard-session-file-include(18990)
> > Reference: URL:http://xforce.iss.net/xforce/xfdb/18990
> 
> Wasn't this fixed in version 2.0.10-1?

Uh.  Yes, looks so.  When I checked this morning I only saw
the vulnerable bits but not the fix in the middle since it
didn't look sufficiently obvious.

Sorry for the noise.

Regards,

        Joey

-- 
The good thing about standards is that there are so many to choose from.
                -- Andrew S. Tanenbaum

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to