Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 255031 (CVE-2008-2384) - www-apache/mod_auth_mysql SQL injection vulnerability (CVE-2008-2384)
Summary: www-apache/mod_auth_mysql SQL injection vulnerability (CVE-2008-2384)
Status: RESOLVED INVALID
Alias: CVE-2008-2384
Product: Gentoo Security
Classification: Unclassified
Component: Auditing (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://thread.gmane.org/gmane.comp.se...
Whiteboard: B3 [invalid]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-01-15 12:21 UTC by Robert Buchholz (RETIRED)
Modified: 2011-05-14 20:24 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
mod_auth_mysql-CVE-2008-2384.patch (mod_auth_mysql-CVE-2008-2384.patch,3.18 KB, patch)
2009-01-15 12:27 UTC, Robert Buchholz (RETIRED)
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2009-01-15 12:21:45 UTC
** Please note that this issue is confidential and no information should be
disclosed until it is made public, see "Whiteboard" for a date **

Martin Joey Schulze reported that mod-auth-mysql insufficiently escapes and potentially allows SQL injections. The mysql module still uses the deprecated mysql_escape_string(), instead of mysql_real_escape_string(). With the attached patch it now also correctly sets a character charset.

http://dev.mysql.com/doc/refman/5.1/en/mysql-escape-string.html
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2009-01-15 12:27:11 UTC
We have a patch, so we could do prestable testing and commit on the embargo
date. However, I don't know if upstream reviewed or approved the patch.
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2009-01-15 12:27:32 UTC
Created attachment 178579 [details, diff]
mod_auth_mysql-CVE-2008-2384.patch
Comment 3 Robert Buchholz (RETIRED) gentoo-dev 2009-01-22 15:30:35 UTC
Steffen Joeris wrote:
The following issue can now be made public. Please note that this describes 
the software used in debian as mod-auth-mysql (binary name is 
libapache2-mod-auth-mysql). It is different from the SF project.
Comment 4 Pierre-Yves Rofes (RETIRED) gentoo-dev 2009-04-08 18:15:45 UTC
Red hat used the patch, so I think we can do the same.
Apache/mysql herd, please provide an updated ebuild.
Comment 5 Benedikt Böhm (RETIRED) gentoo-dev 2009-07-05 16:23:08 UTC
(In reply to comment #3)
> Steffen Joeris wrote:
> The following issue can now be made public. Please note that this describes 
> the software used in debian as mod-auth-mysql (binary name is 
> libapache2-mod-auth-mysql). It is different from the SF project.

but we're using the one from SF!
Comment 6 Stefan Behte (RETIRED) gentoo-dev Security 2009-07-05 16:45:11 UTC
As whiteboard does not mention a date, and don't know if this is really public (or "semi-public") I'm make the bug private again.
Comment 7 Robert Buchholz (RETIRED) gentoo-dev 2009-07-05 17:46:32 UTC
All info in this bug is public via the URL. It is still open in the Auditing section because we may want to research the sf project for a similar bug.
Comment 8 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2010-03-24 20:03:21 UTC
mod_auth_mysql != mod-auth-mysql

1. debian's mod_auth_mysql is a different package than the sourceforge one we package. hollow noted this 6 months ago, and you ignored us. The patch has exactly one hunk that matches, simply because of whitespace, the other hunks don't apply at all!
2. I do see that this codebase is vulnerable to the same class of problem described.
3. The mod-auth-mysql package basically forked from mod_auth_mysql in 2002, and while some consolidation attempts happened between upstreams over the years, they continued to drift apart. Both of them share the same heritage as being bundled in early versions of Apache contrib.

I say RESO INVALID, and as one of the maintainers, either security can close the bug, or I will.
Comment 9 Tim Sammut (RETIRED) gentoo-dev 2011-05-14 20:24:07 UTC
(In reply to comment #8)
> mod_auth_mysql != mod-auth-mysql
> 
> I say RESO INVALID, and as one of the maintainers, either security can close
> the bug, or I will.

Seems clear to me. If anyone disagrees, please reopen. Thanks.