Common Vulnerabilities and Exposures assigned an identifier CVE-2011-3761 to the following vulnerability: NuSOAP 0.9.5 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by nuSOAP/classes/class.wsdl.php and certain other files. References: [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3761 [2] http://www.openwall.com/lists/oss-security/2011/06/27/6 [3] http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README [4] http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/NuSOAP
This issue affects the versions of the php-nusoap package, as shipped with Fedora release of 14 and 15. Please schedule an update. -- This issue affects the version of the php-nusoap package, as present within EPEL-5 repository. Please schedule an update.
Created php-nusoap tracking bugs for this issue Affects: fedora-all [bug 741267] Affects: epel-5 [bug 741268]
This appears to have been fixed in the upstream sources, but no release was cut after 0.9.5: 2011-02-28, version 0.9.6 - nusoap_base: Set initial global debug level to 0 rather than 9 The fix sounds like a match for the flaw mentioned here, so if this package is being maintained, this backport could fix the flaw in Fedora and epel5. Of course, if the package is unmaintained, it might make sense to just retire the package.