Common Vulnerabilities and Exposures assigned an identifier CVE-2011-3699 to
the following vulnerability:
John Lim ADOdb Library for PHP 5.11 allows remote attackers to obtain
sensitive information via a direct request to a .php file, which
reveals the installation path in an error message, as demonstrated by
tests/test-active-record.php and certain other files.
Created php-adodb tracking bugs for this issue
Affects: fedora-all [bug 741378]
Affects: epel-all [bug 741379]
I am sorry but I need to ask: how an attacker is going to access those files? they are not in the webroot so I can't really see how you can request them directly.
Am I missing something?
So the Fedora installation takes care not to install them to the webroot? If that is the case, then likely we do not need to address this. Do you know if any other files expose the path information like that file does?
(Sorry, I did not have a chance to look too closely, there were 120+ CVEs assigned for this kind of flaw)
Yes, I just double checked and all php files in the package (including tests ) ends up in /usr/share/php/adodb which is not under the web root.
It is still probably a good idea to remove the test files from the main package, I'll probably do it in the next update
Great, thanks for checking. I'll close these bugs as NOTABUG then.