Your message dated Sun, 09 Sep 2007 12:32:06 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#441390: fixed in phpwiki 1.3.12p3-6.1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: phpwiki
Severity: serious
Version: 1.3.12p3-5
Tags: security patch

Hi,

The following has been reported:

CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability in
the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows
remote attackers to upload arbitrary PHP files with a double extension, as
demonstrated by .php.3, which is interpreted by Apache as being a valid
PHP file.

The patch is attached. I'm already preparing an NMU as per your permission in 
#429201.

Thanks!

Thijs
diff -ur phpwiki-1.3.12p3.orig/lib/plugin/UpLoad.php phpwiki-1.3.12p3/lib/plugin/UpLoad.php
--- phpwiki-1.3.12p3.orig/lib/plugin/UpLoad.php	2006-06-18 13:19:23.000000000 +0200
+++ phpwiki-1.3.12p3/lib/plugin/UpLoad.php	2007-09-09 13:37:48.000000000 +0200
@@ -136,7 +136,7 @@
             $userfile_name = trim(basename($userfile_name));
             $userfile_tmpname = $userfile->getTmpName();
 	    $err_header = HTML::h2(fmt("ERROR uploading '%s': ", $userfile_name));
-            if (preg_match("/(\." . join("|\.", $this->disallowed_extensions) . ")\$/",
+            if (preg_match("/(\." . join("|\.", $this->disallowed_extensions) . ")(\.|\$)/i",
                            $userfile_name))
             {
             	$message->pushContent($err_header);

Attachment: pgpdnGT8UeT5J.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: phpwiki
Source-Version: 1.3.12p3-6.1

We believe that the bug you reported is fixed in the latest version of
phpwiki, which is due to be installed in the Debian FTP archive:

phpwiki_1.3.12p3-6.1.diff.gz
  to pool/main/p/phpwiki/phpwiki_1.3.12p3-6.1.diff.gz
phpwiki_1.3.12p3-6.1.dsc
  to pool/main/p/phpwiki/phpwiki_1.3.12p3-6.1.dsc
phpwiki_1.3.12p3-6.1_all.deb
  to pool/main/p/phpwiki/phpwiki_1.3.12p3-6.1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thijs Kinkhorst <[EMAIL PROTECTED]> (supplier of updated phpwiki package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 09 Sep 2007 14:10:57 +0200
Source: phpwiki
Binary: phpwiki
Architecture: source all
Version: 1.3.12p3-6.1
Distribution: unstable
Urgency: high
Maintainer: Matt Brown <[EMAIL PROTECTED]>
Changed-By: Thijs Kinkhorst <[EMAIL PROTECTED]>
Description: 
 phpwiki    - informal collaborative website manager
Closes: 429201 441390
Changes: 
 phpwiki (1.3.12p3-6.1) unstable; urgency=high
 .
   * NMU by the testing security team, with maintainer approval.
   * CVE-2007-3193: lib/WikiUser/LDAP.php in PhpWiki before 1.3.13p1, when the
     configuration lacks a nonzero PASSWORD_LENGTH_MINIMUM, might allow remote
     attackers to bypass authentication via an empty password, which causes
     ldap_bind to return true when used with certain LDAP implementations.
     (Closes: #429201)
   * CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability in
     the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows
     remote attackers to upload arbitrary PHP files with a double extension, as
     demonstrated by .php.3, which is interpreted by Apache as being a valid
     PHP file.
     (Closes: #441390)
Files: 
 602ff85abf15b44168a96db76e039d6f 934 web optional phpwiki_1.3.12p3-6.1.dsc
 26fd9260ce97813898cf78267982186c 50786 web optional 
phpwiki_1.3.12p3-6.1.diff.gz
 fa7efaa0bbc83817d92923bed0a33e0e 2858092 web optional 
phpwiki_1.3.12p3-6.1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBRuPjs2z0hbPcukPfAQLbtAf/Z7sddZw2Euo3LyAvYfpfSbF4gHNSDCk+
ID83jEmJZUDl6tSloeB9dazYnEbTIqS9DpSaS3XGdu+wZKGbVn6OmUlZX3T+FVGx
nvk8cNL2Xl45FYox2fwqOvDk9vYG/WAaPfeleMs/OG5tZEzUgsRmtofCfBEaMRfP
WrRACRyiB6YsC9SIbqkTH7gW568OrHVQe0zsT2CMJGOSXMPY7rt5lyRmeHal9cwA
tIqiHve2TuKEqKjTpJtrN0Sg40Fplth+5rl027P4XgDXlb1Fe1ef1DqMXT6aIxe2
tgMwwNltFh+zd0Ry9KNIb3gGw2G0QwJgQW84LXUQjlTv3JOQomm4sw==
=Y6Tg
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to