Summary: | webapps as a spam relay | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Stuart Herbert (RETIRED) <stuart> |
Component: | Current packages | Assignee: | Gentoo Web Application Packages Maintainers <web-apps> |
Status: | RESOLVED CANTFIX | ||
Severity: | normal | CC: | ramereth, security, tomk |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.php.net/manual/en/ref.mail.php#55256 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Stuart Herbert (RETIRED)
![]() ok, not quite sure how security handles this, rated B4 because it seems to be a bit of an XSS. web-apps team is about to start a major audit session of all webapps. Please open new bugs for each (bunch of) package(s). Stuart will you coordinate with webapps? What makes this attack new ? User input always had to be triplechecked before being used, especially when used to run a system command, send mail or make an SQL query... Next: webapps as a SQL injection tool ? This should be an (open) Auditing bug, I think. Reassigning to web-apps who are welcome to audit their packages and report vulnerabilities. Unrestricting so that they can freely access it. Cc:ing security. Stuart - where do we stand on this? I would imagine this is an upstream issue. I'm going to go ahead and close as CANTFIX as this is an upstream issue. |