Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 200411-32 ] phpBB: Remote command execution
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Moderator
Moderator


Joined: 13 Jun 2003
Posts: 4087
Location: Dresden, Germany

PostPosted: Wed Nov 24, 2004 10:06 am    Post subject: [ GLSA 200411-32 ] phpBB: Remote command execution Reply with quote

Gentoo Linux Security Advisory

Title: phpBB: Remote command execution (GLSA 200411-32)
Severity: high
Exploitable: remote
Date: November 24, 2004
Updated: May 22, 2006
Bug(s): #71681
ID: 200411-32

Synopsis

phpBB contains a vulnerability which allows a remote attacker to execute arbitrary commands with the rights of the web server user.

Background

phpBB is an Open Source bulletin board package.

Affected Packages

Package: www-apps/phpbb
Vulnerable: < 2.0.10
Unaffected: >= 2.0.11
Architectures: All supported architectures


Description

phpBB contains a vulnerability in the highlighting code and several vulnerabilities in the username handling code.

Impact

An attacker can exploit the highlighting vulnerability to access the PHP exec() function without restriction, allowing them to run arbitrary commands with the rights of the web server user (for example the apache user). Furthermore, the username handling vulnerability might be abused to execute SQL statements on the phpBB database.

Workaround

There is a one-line patch which will remediate the remote execution vulnerability. Locate the following block of code in viewtopic.php:
Code:
    //    // Was a highlight request part of the URI?    //
$highlight_match = $highlight = '';    if (isset($HTTP_GET_VARS['highlight']))    {       // Split words and phrases
$words = explode(' ', trim(htmlspecialchars(urldecode($HTTP_GET_VARS['highlight']))));       for($i = 0; $i < sizeof($words); $i++)       {
Replace with the following:
Code:
    //    // Was a highlight request part of the URI?    //
$highlight_match = $highlight = '';    if (isset($HTTP_GET_VARS['highlight']))    {       // Split words and phrases
$words = explode(' ', trim(htmlspecialchars($HTTP_GET_VARS['highlight'])));       for($i = 0; $i < sizeof($words); $i++)       {


Resolution

All phpBB users should upgrade to the latest version to fix all known vulnerabilities:
Code:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/phpbb-2.0.11"


References

phpBB.com Announcement
CVE-2004-1315


Last edited by GLSA on Sun Jul 30, 2006 4:16 am; edited 4 times in total
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum