|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-1921: php XML RPC code injection | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Thomas Biege <thomas> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Major | ||
| Priority: | P3 - Medium | CC: | patch-request, postadal, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | CVE-2005-1921: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: |
RPC.php.diff
run with "php CAN-2005-1921-exploit.php" |
||
|
Description
Thomas Biege
2005-06-29 15:09:49 UTC
CAN-2005-1921 >Can you forward that CVE id to the Gulftech people. I'd like to prevent >multiple CVE names getting assigned. > > > I can try. But I do not know a contact address yet. The whole thing is ugly, because obviously Gulftech contacted postNuke and the author of phpxmlrpc.php but not PHP.net Maybe they also contacted TikiWiki, Drupal etc... And waited for them to fix it, because there is no official Gulftech advisory yet. Only the PostNuke Authors wrote an advisory and now thanks to Secunia and co everyone know that there is a dangerous bug in XML_RPC. >Thanks for this heads up, it's appreciated as I think this issue is going >to be a bit ugly. > > It is already ugly and the PEAR developers have just released a fast update of XML_RPC. The Serendipity Developers have already provided an updated version. (But due to a bug in s9y < 0.8.2 the installed PEAR version is used instead of the bundled lib, so upgrading PEAR would have fixed it already) Stefan Created attachment 40437 [details]
RPC.php.diff
RPC.php.diff
this is critical. we need fixes ASAP, but this should probably not block SP2. SM-Tracker-1669 Which subpackages are affected? I've already prepared patchinfos with the list from last time. If additional packages are affected they need to be adapted. hmm, second question is can one interject data into pear from remote? i thought pear itself is used only by the admin when called. according to stefan esser it is not problematic for pear itself. horde appears not affected (has RPC.php, but this is from ext/xml I think), but Petr, please cross check. so, drop down to normal for now. An exploit is available in the wild. I checked horde and it is ok. php4 is affected in tarball BUILD/php-4.3.10/pear/packages/XML_RPC-1.1.0.tar php5 is affected in tarball BUILD/php-5.0.4/pear/packages/XML_RPC-1.2.2.tar Could some one take care about it? (I will be on vacation until 11.7. ;( ) SLES8 appears not to package XML_RPC. all others do. fixed packages submitted to autobuild php4-pear and php5-pear packages contain the fix Created attachment 41293 [details]
run with "php CAN-2005-1921-exploit.php"
Had to remove one ) from the exploit to make it work. If it outputs lots of
stuff php is exploitable. If it prints "no error" then the bug is fixed.
updates approved, advisory released CVE-2005-1921: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) |