A directory traversal and information disclosure (local file inclusion) flaws were found in the cssgen contrib module (application to generate custom CSS files) of GeSHi, a generic syntax highlighter, performed sanitization of 'geshi-path' and 'geshi-lang-path' HTTP GET / POST variables. A remote attacker could provide a specially-crafted URL that, when visited could lead to local file system traversal or, potentially, ability to read content of any local file, accessible with the privileges of the user running the webserver. References: [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685324 Upstream patch: [2] http://geshi.svn.sourceforge.net/viewvc/geshi?view=revision&revision=2507
Created php-geshi tracking bugs for this issue Affects: fedora-all [bug 850435] Affects: epel-all [bug 850436]
This issue affects the versions of the php-geshi package, as shipped with Fedora 16 and 17. Please schedule an update. -- This issue affects the versions of the php-geshi package, as shipped with Fedora EPEL 5 and EPEL 6. Please schedule an update.
The CVE identifier of CVE-2012-3521 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2012/08/21/11
php-geshi-1.0.8.11-3.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
php-geshi-1.0.8.11-3.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
php-geshi-1.0.8.11-3.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
EPEL 5 and 6 are shipping a fixed version too.