Some vulnerabilities have been reported in PHProjekt, which can be exploited by malicious users to conduct cross-site scripting, script insertion, cross-site request forgery, and SQL injection attacks and potentially compromise a vulnerable system. 1) Input passed to unspecified parameters is not properly sanitised before being returned to a user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) Input passed to unspecified parameters in the calendar module is not properly sanitised before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 3) Input passed to unspecified parameters in the search module is not properly sanitised before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 4) Input passed to an unspecified cookie is not properly sanitised before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code when the user logs out. 5) An error within the CSRF prevention routine can be exploited to conduct CSRF attacks. 6) Users can upload files through e.g. the calendar or file management modules. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP file. 7) Input passed to unspecified parameters is not properly verified before being used. This can be exploited to insert HTML and script code, which will executed in a user's browser session in context of an affected site if malicious data is viewed. Successful exploitation of the vulnerabilities reportedly requires that a valid user is logged in. The vulnerabilities are reported in version 5.2. Other versions may also be affected. Solution: upgrade to 5.2.1
web-apps please advise and bump as necessary.
ping web-apps
web-apps, please advise.
been over a month without a reaction on this one web-apps, please provide an updated ebuild, otherwise I propose to mask this in about a week maybe
any news here?
I started going through the open security bugs. No real excuse for the long delay except an extreme lack of manpower in webapps at the moment. Working through the bugs following severity.
5.2.2 in CVS, please wait for the mirrors to pick up the tarball
Thx Renat. Arches please test and mark stable. Target keywords are: phprojekt-5.2.2.ebuild:KEYWORDS="ppc x86"
x86 stable
Stable on ppc.
ready for GLSA decision. I vote NO.
SQL injection is not nice. Voting YES.
i vote yes due to the SQL injection issue and PHP execution of code, which make this bug a B2 (or C2 because of the need of a valid account), then [glsa].
GLSA 200706-07, sorry for the delay