Summary: | dev-php/smarty Release 2.6.8 contains security fixes | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Andreas Korthaus <akorthaus> |
Component: | GLSA Errors | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | php-bugs, tomk |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://news.php.net/php.smarty.dev/2673 | ||
Whiteboard: | C1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Andreas Korthaus
2005-03-24 01:42:55 UTC
PHP team, please bump dev-php/smarty-2.6.8 is in portage now. Arches: please test and mark stable Stable on SPARC. Stable on x86 and amd64. Stable on ppc. Stable on hppa, thanks to KillerFox for testing. Stable on alpha. GLSA 200503-35 Smarty 2.6.9 has been released with some more security fixes, I'll add the ebuild soon. will be released as an update to GLSA 200503-35 smarty{,-docs}-2.6.9 in cvs, stable on x86 and amd64. Arches please mark stable. Stable on ppc. Alpha stable. sparc done. security: UPDATE draft sent, please approve UPDATE sent Just a note, this is a misleading bullitin (and showing up high in google results): http://www.gentoo.org/security/en/glsa/glsa-200503-35.xml The vulnerability does not open attacks from remote users, it only allows someone with direct access to template files to execute PHP commands from within the template. It would be good for someone to change that wording, thanks. tomk/php-bugs/auditors please advise wether this is remotely exploitable. (In reply to comment #19) > tomk/php-bugs/auditors please advise wether this is remotely exploitable. > According to the first entry in: http://smarty.php.net/index_archive.php it's not remotely exploitable. You need local access to the smarty template files to be able bypass certain checks when template security is enabled. That being said, when such a template has been created by a local user then the vulnerable code would be run when accessed remotely via the webserver. I'm unsure as to the criteria used to determine whether that is defined as being locally or remotely exploitable. I defined it as remotely exploitable because smarty's "template security" feature is typically used to allow untrusted users to plug their own template in a PHP application (for example, a bulletin board that allows users to customize templates). The hole is that the "template security" feature can be bypassed to allow to execute arbitrary code while theorically this should not be possible for those users. In which case the hole is remote, because the attacker doesn't need to be a local user. I agree it's a little misleading to use the term "Remote attacker" everywhere, since the attack can only be remote if the application allows users to upload their own templates... > I defined it as remotely exploitable because smarty's "template security"
> feature is typically used to allow untrusted users to plug their own template
> in a PHP application (for example, a bulletin board that allows users to
> customize templates).
yes, but generally, such PHP interfaces are reserved with an authentication device (at least, i hope so). Consequently, the potential attackers are not totally "unknown". This is remote but reserved for known members of a group.
Well i think this doens't worth any update and we could close it.
I think we can close this bug now, please REOPEN if anyone disagrees. |