rgod has reported a vulnerability in phpWebSite, which can be exploited by malicious people to disclose sensitive information and potentially compromise a vulnerable system. Input passed to the "hub_dir" parameter in "index.php" isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from local resources. This can further be exploited to include arbitrary PHP scripts from an external Windows share if the affected system is running PHP 5 on Windows. Successful exploitation requires that "magic_quotes_gpc" is disabled. The vulnerability has been reported in version 0.10.2. Other versions may also be affected. Solution: Edit the source code to ensure that input is properly verified. Provided and/or discovered by: rgod
web-apps, please provide fixed ebuilds, thanks
Patch available at : http://phpwebsite.appstate.edu/index.php?module=announce&ANN_user_op=view&ANN_id=1116 web-apps please patch
in CVS
Thx Renat. Arches please test and mark stable.
ppc stable
alpha stable.
x86 stable
Stable on SPARC
Ready for GLSA
GLSA 200605-04