Lucene search

K
gentooGentoo FoundationGLSA-201111-04
HistoryNov 11, 2011 - 12:00 a.m.

phpDocumentor: Function call injection

2011-11-1100:00:00
Gentoo Foundation
security.gentoo.org
20

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.9%

Background

The phpDocumentor package provides automatic documenting of PHP API directly from the source.

Description

phpDocumentor bundles Smarty with the modifier.regex_replace.php plug-in which does not properly sanitize input related to the ASCII NUL character in a search string.

Impact

A remote attacker could call arbitrary PHP functions via templates.

Workaround

There is no known workaround at this time.

Resolution

All phpDocumentor users should upgrade to the latest stable version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=dev-php/PEAR-PhpDocumentor-1.4.3-r1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since February 12, 2011. It is likely that your system is already no longer affected by this issue.

OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-php/pear-phpdocumentor< 1.4.3-r1UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.9%