Your message dated Wed, 12 Sep 2007 19:56:16 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#441390: fixed in phpwiki 1.3.12p3-5etch1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: phpwiki
Severity: serious
Version: 1.3.12p3-5
Tags: security patch

Hi,

The following has been reported:

CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability in
the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows
remote attackers to upload arbitrary PHP files with a double extension, as
demonstrated by .php.3, which is interpreted by Apache as being a valid
PHP file.

The patch is attached. I'm already preparing an NMU as per your permission in 
#429201.

Thanks!

Thijs
diff -ur phpwiki-1.3.12p3.orig/lib/plugin/UpLoad.php phpwiki-1.3.12p3/lib/plugin/UpLoad.php
--- phpwiki-1.3.12p3.orig/lib/plugin/UpLoad.php	2006-06-18 13:19:23.000000000 +0200
+++ phpwiki-1.3.12p3/lib/plugin/UpLoad.php	2007-09-09 13:37:48.000000000 +0200
@@ -136,7 +136,7 @@
             $userfile_name = trim(basename($userfile_name));
             $userfile_tmpname = $userfile->getTmpName();
 	    $err_header = HTML::h2(fmt("ERROR uploading '%s': ", $userfile_name));
-            if (preg_match("/(\." . join("|\.", $this->disallowed_extensions) . ")\$/",
+            if (preg_match("/(\." . join("|\.", $this->disallowed_extensions) . ")(\.|\$)/i",
                            $userfile_name))
             {
             	$message->pushContent($err_header);

Attachment: pgpbIfynEyxUv.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: phpwiki
Source-Version: 1.3.12p3-5etch1

We believe that the bug you reported is fixed in the latest version of
phpwiki, which is due to be installed in the Debian FTP archive:

phpwiki_1.3.12p3-5etch1.diff.gz
  to pool/main/p/phpwiki/phpwiki_1.3.12p3-5etch1.diff.gz
phpwiki_1.3.12p3-5etch1.dsc
  to pool/main/p/phpwiki/phpwiki_1.3.12p3-5etch1.dsc
phpwiki_1.3.12p3-5etch1_all.deb
  to pool/main/p/phpwiki/phpwiki_1.3.12p3-5etch1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thijs Kinkhorst <[EMAIL PROTECTED]> (supplier of updated phpwiki package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun,  9 Sep 2007 13:58:30 +0200
Source: phpwiki
Binary: phpwiki
Architecture: source all
Version: 1.3.12p3-5etch1
Distribution: stable-security
Urgency: high
Maintainer: Matt Brown <[EMAIL PROTECTED]>
Changed-By: Thijs Kinkhorst <[EMAIL PROTECTED]>
Description: 
 phpwiki    - informal collaborative website manager
Closes: 429201 441390
Changes: 
 phpwiki (1.3.12p3-5etch1) stable-security; urgency=high
 .
   * Non-maintainer upload by the security team.
   * CVE-2007-3193: lib/WikiUser/LDAP.php in PhpWiki before 1.3.13p1, when the
     configuration lacks a nonzero PASSWORD_LENGTH_MINIMUM, might allow remote
     attackers to bypass authentication via an empty password, which causes
     ldap_bind to return true when used with certain LDAP implementations.
     (Closes: #429201)
   * CVE-2007-2024, CVE-2007-2025: Unrestricted file upload vulnerability in
     the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows
     remote attackers to upload arbitrary PHP files with a double extension, as
     demonstrated by .php.3, which is interpreted by Apache as being a valid
     PHP file.
     (Closes: #441390)
Files: 
 8d23044064042e6130066a2ca8c4717c 940 web optional phpwiki_1.3.12p3-5etch1.dsc
 7073885a9a3993db0e1820315a224e54 3651174 web optional 
phpwiki_1.3.12p3.orig.tar.gz
 2deb7c9bc44ccaa1ecaf88656c7f1b27 52689 web optional 
phpwiki_1.3.12p3-5etch1.diff.gz
 178a4ca234bf9b66c4b96a3f635dd510 2885540 web optional 
phpwiki_1.3.12p3-5etch1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBRuPivmz0hbPcukPfAQLEaQf/csFY7+/Rty/t/YMLPiBojeyY4yGYpUlB
PUpFNkO1SzAv3EvXP2OAUxCpaHZc2vzqpb5IbCrGxixiwQ8EMryvcruqZ91hiWSU
2zK69u85+XpPJPmk5xHw7S2kt5T4apOQx/+sdJUkE0xDNg2OTTp/H6CEA/C4eC4C
Mi4iasskzY89fdyEQpTuqYA4YvNtPkpIQGjFCUi7wTCFx6vFghzn1fOtI6G4RHfJ
r1cGH2el8Sq8U6ARZnZ2ePpVXsG5atrDvpdJEogzhpN8ZiLqMw+dWzLVMhIKBh56
osxveSyfVTAdZQLztpI5SYiGfrboZigQUJpADpMYo6USO+RRJM/gDg==
=GaMy
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to