Common Vulnerabilities and Exposures assigned an identifier CVE-2011-3699 to the following vulnerability: Name: CVE-2011-3699 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3699 Assigned: 20110923 Reference: http://www.openwall.com/lists/oss-security/2011/06/27/6 Reference: http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README Reference: http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/adodb John Lim ADOdb Library for PHP 5.11 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by tests/test-active-record.php and certain other files.
Created php-adodb tracking bugs for this issue Affects: fedora-all [bug 741378] Affects: epel-all [bug 741379]
I am sorry but I need to ask: how an attacker is going to access those files? they are not in the webroot so I can't really see how you can request them directly. Am I missing something?
So the Fedora installation takes care not to install them to the webroot? If that is the case, then likely we do not need to address this. Do you know if any other files expose the path information like that file does? (Sorry, I did not have a chance to look too closely, there were 120+ CVEs assigned for this kind of flaw)
Yes, I just double checked and all php files in the package (including tests ) ends up in /usr/share/php/adodb which is not under the web root. It is still probably a good idea to remove the test files from the main package, I'll probably do it in the next update
Great, thanks for checking. I'll close these bugs as NOTABUG then.