On Sat, Nov 01, 2008 at 10:11:56PM +1100, Steffen Joeris wrote:
> Package: mahara
> Severity: grave
> Tags: security, patch
> Justification: user security hole
> 
> Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for mahara.
> 
> CVE-2008-4796[0]:
> | The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3
> | and earlier allows remote attackers to execute arbitrary commands via
> | shell metacharacters in https URLs.  NOTE: some of these details are
> | obtained from third party information.
> 
> The extracted patch for Snoopy.class.php can be found here[1]. However
> it would be much appreciated (and it is a release goal anyway), if
> you could just depend on libphp-snoopy, instead of duplicating the code.
> (Maybe you need to change some includes, I didn't check that).
> That would make life much easier for the security team.
> 
> >From what I can see you have two small patches in your copy of
> Snoopy.class.php. However, if I am not mistaken, both could probably
> go into the libphp-snoopy package, so please talk to the maintainer,
> if you really depend on them.

From what I remember, we _did_ need those patches, so we'll be sure to talk
to the Snoopy maintainer about that. It does make more sense for us to
depend on libphp-snoopy; we already had this problem with Smarty in Debian
too.

Thanks for the report.

-- 
Regards,
Nigel McNie | Mahara Lead Developer | http://www.mahara.org/
Catalyst IT | http://catalyst.net.nz
DDI: +64 4 803 2203

Attachment: signature.asc
Description: Digital signature

Reply via email to