Bug 741377 (CVE-2011-3699)
Summary: | CVE-2011-3699 php-adodb: installation path disclosure via a direct request to a .php file | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | andrew, giallu |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2011-09-26 21:42:15 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 741378, 741379 | ||
Bug Blocks: |
Description
Vincent Danen
2011-09-26 17:38:27 UTC
Created php-adodb tracking bugs for this issue Affects: fedora-all [bug 741378] Affects: epel-all [bug 741379] I am sorry but I need to ask: how an attacker is going to access those files? they are not in the webroot so I can't really see how you can request them directly. Am I missing something? So the Fedora installation takes care not to install them to the webroot? If that is the case, then likely we do not need to address this. Do you know if any other files expose the path information like that file does? (Sorry, I did not have a chance to look too closely, there were 120+ CVEs assigned for this kind of flaw) Yes, I just double checked and all php files in the package (including tests ) ends up in /usr/share/php/adodb which is not under the web root. It is still probably a good idea to remove the test files from the main package, I'll probably do it in the next update Great, thanks for checking. I'll close these bugs as NOTABUG then. |