possible script injection via /etc/wordpress/wp-config.php

Related Vulnerabilities: CVE-2008-5113  

Debian Bug report logs - #500295
possible script injection via /etc/wordpress/wp-config.php

version graph

Reported by: Raphael Geissert <atomo64@gmail.com>

Date: Sat, 27 Sep 2008 00:18:02 UTC

Severity: important

Tags: security

Found in versions wordpress/2.5.1-7, wordpress/2.0.10-1etch4, wordpress/2.8.4-1

Done: Giuseppe Iuculano <giuseppe@iuculano.it>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Andrea De Iacovo <andrea.de.iacovo@gmail.com>:
Bug#500295; Package wordpress. (Sat, 27 Sep 2008 00:18:04 GMT) (full text, mbox, link).


Message #3 received at submit@bugs.debian.org (full text, mbox, reply):

From: Raphael Geissert <atomo64@gmail.com>
To: submit@bugs.debian.org
Subject: possible script injection via /etc/wordpress/wp-config.php
Date: Fri, 26 Sep 2008 19:17:01 -0500
[Message part 1 (text/plain, inline)]
Package: wordpress
Version: 2.5.1-7
Severity: important
Tags: security

The file as found in 2.5.1-7 takes the HTTP_HOST and uses it to find the 
config-<host>.php file to include.

This routine is prone to attacks by a local user via a especially crafted Host 
header.

Feel free to increase the severity.

Cheers,
-- 
Atomo64 - Raphael

Please avoid sending me Word, PowerPoint or Excel attachments.
See http://www.gnu.org/philosophy/no-word-attachments.html
[signature.asc (application/pgp-signature, inline)]

Bug marked as found in version 2.0.10-1etch4. Request was from Raphael Geissert <atomo64@gmail.com> to control@bugs.debian.org. (Sat, 27 Sep 2008 01:33:02 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#500295; Package wordpress. (Sun, 28 Sep 2008 11:45:05 GMT) (full text, mbox, link).


Acknowledgement sent to Andrea De Iacovo <andrea.de.iacovo@gmail.com>:
Extra info received and forwarded to list. (Sun, 28 Sep 2008 11:45:05 GMT) (full text, mbox, link).


Message #10 received at 500295@bugs.debian.org (full text, mbox, reply):

From: Andrea De Iacovo <andrea.de.iacovo@gmail.com>
To: 500295@bugs.debian.org
Date: Sun, 28 Sep 2008 13:41:14 +0200
[Message part 1 (text/plain, inline)]
Hi

Maybe you're right but the problem is still really not critical. 
wp-config.php looks for something like /etc/wordpress/config-$host.php
so my question is: if someone has unauthorized and maliciuos access
to /etc/wordpress (or, maybe, to /etc/*?) is it a wordpress problem?

However I'll try to find a better way to look for the correct
configuration file: maybe reading a local list of authorized config
files?

Thank you for reporting.

Cheers.

Andrea De Iacovo
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Andrea De Iacovo <andrea.de.iacovo@gmail.com>:
Bug#500295; Package wordpress. (Sun, 30 Nov 2008 18:48:03 GMT) (full text, mbox, link).


Message #13 received at 500295@bugs.debian.org (full text, mbox, reply):

From: Raphael Geissert <atomo64@gmail.com>
To: 500295@bugs.debian.org
Subject: Re: possible script injection via /etc/wordpress/wp-config.php
Date: Sun, 30 Nov 2008 12:41:52 -0600
[Message part 1 (text/plain, inline)]
Hi,

On Sunday 28 September 2008, Andrea De Iacovo wrote:
> Hi
>
> Maybe you're right but the problem is still really not critical.
> wp-config.php looks for something like /etc/wordpress/config-$host.php
> so my question is: if someone has unauthorized and maliciuos access
> to /etc/wordpress (or, maybe, to /etc/*?) is it a wordpress problem?

Based on what just happened with the XSS vuln via HTTP_HOST in the RSS feeds 
I'd say yes.

Although like I mentioned the other day in IRC, I think it is more a bug on 
apache than on wordpress or php itself.

>
> However I'll try to find a better way to look for the correct
> configuration file: maybe reading a local list of authorized config
> files?

>     $debian_server = preg_replace('/:.*/', "", $_SERVER['HTTP_HOST']);
>     $debian_file =
> '/etc/wordpress/config-'.strtolower($debian_server).'.php';

$allowed_paths = array('/etc/wordpress/');
if (!in_array(dirname(realpath($debian_file)), $allowed_paths))
die("The config file for the specified host is not under an allowed path");

>
> Thank you for reporting.
>
> Cheers.
>
> Andrea De Iacovo

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Andrea De Iacovo <andrea.de.iacovo@gmail.com>:
Bug#500295; Package wordpress. (Sat, 15 Aug 2009 17:30:11 GMT) (full text, mbox, link).


Acknowledgement sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
Extra info received and forwarded to list. Copy sent to Andrea De Iacovo <andrea.de.iacovo@gmail.com>. (Sat, 15 Aug 2009 17:30:11 GMT) (full text, mbox, link).


Message #18 received at 500295@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <giuseppe@iuculano.it>
To: 500295@bugs.debian.org,control@bugs.debian.org,500295-submitter@bugs.debian.org
Subject: [cf78bf5] Fix for Bug#500295 committed to git
Date: Sat, 15 Aug 2009 17:22:09 +0000
tags 500295 +pending
thanks

Hello,

     The following change has been committed for this bug by
 Giuseppe Iuculano <giuseppe@iuculano.it> on Sat, 15 Aug 2009 19:19:02 +0200.
 The fix will be in the next upload. 
=========================================================================
debian/wp-config.php: check if $debian_file is under /etc/wordpress and mitigate a possible script injection via /etc/wordpress/wp-config.php (Closes: #500295)


=========================================================================

You can check the diff of the fix at:

    http://git.debian.org/?p=users/derevko-guest/wordpress.git;a=commitdiff;h=cf78bf5






Added tag(s) pending. Request was from Giuseppe Iuculano <giuseppe@iuculano.it> to control@bugs.debian.org. (Sat, 15 Aug 2009 17:30:12 GMT) (full text, mbox, link).


Message sent on to Raphael Geissert <atomo64@gmail.com>:
Bug#500295. (Sat, 15 Aug 2009 17:30:15 GMT) (full text, mbox, link).


Reply sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
You have taken responsibility. (Tue, 18 Aug 2009 07:39:17 GMT) (full text, mbox, link).


Notification sent to Raphael Geissert <atomo64@gmail.com>:
Bug acknowledged by developer. (Tue, 18 Aug 2009 07:39:17 GMT) (full text, mbox, link).


Message #28 received at 500295-close@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <giuseppe@iuculano.it>
To: 500295-close@bugs.debian.org
Subject: Bug#500295: fixed in wordpress 2.8.4-1
Date: Tue, 18 Aug 2009 07:02:24 +0000
Source: wordpress
Source-Version: 2.8.4-1

We believe that the bug you reported is fixed in the latest version of
wordpress, which is due to be installed in the Debian FTP archive:

wordpress_2.8.4-1.diff.gz
  to pool/main/w/wordpress/wordpress_2.8.4-1.diff.gz
wordpress_2.8.4-1.dsc
  to pool/main/w/wordpress/wordpress_2.8.4-1.dsc
wordpress_2.8.4-1_all.deb
  to pool/main/w/wordpress/wordpress_2.8.4-1_all.deb
wordpress_2.8.4.orig.tar.gz
  to pool/main/w/wordpress/wordpress_2.8.4.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 500295@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Giuseppe Iuculano <giuseppe@iuculano.it> (supplier of updated wordpress package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 18 Aug 2009 08:28:23 +0200
Source: wordpress
Binary: wordpress
Architecture: source all
Version: 2.8.4-1
Distribution: unstable
Urgency: low
Maintainer: Giuseppe Iuculano <giuseppe@iuculano.it>
Changed-By: Giuseppe Iuculano <giuseppe@iuculano.it>
Description: 
 wordpress  - weblog manager
Closes: 500295 504242 517969 541371
Changes: 
 wordpress (2.8.4-1) unstable; urgency=low
 .
   * [5f0812d] Imported Upstream version 2.8.4
   * [e1ea94b] Switch to quilt
   * [cf8904e] Removed Andrea De Iacovo from Maintainer field, thanks
     Andrea for the prior work on wordpress!
   * [6013bd8] Removed 007_REQUEST.patch, upstream already fixed CVE-2008-5113
     in a better way
   * [8da39ea] Removed 004languages.patch, it contains outdated languages
     files
   * [d5696ea] debian/control: Updated Vcs control field
   * [89316e0] debian/rules: Comment the DH_VERBOSE export
   * [cf78bf5] debian/wp-config.php: check if $debian_file is under
     /etc/wordpress and mitigate a possible script injection via
     /etc/wordpress/wp-config.php. Thanks to Raphael Geissert (Closes: #500295)
   * [ece1c25] debian/get-upstream-i18n: Do not remove outdated language
     files by default
   * [59547a2] Do not embed tinymce, php-gettext and cropper. (Closes: #504242)
   * [848828d] debian/postinst: Create the symlinks manually, dpkg
     doesn't replace directories with symlinks. (Closes: #517969)
   * [2af4aea] debian/patches/009CVE2008-6767.patch: Grant upgrade
     privilege to all admin users. Thanks to Ivan Warren (Closes: #541371)
   * [46e8f2b] debian/control: Removed the sentence about the French
     language support, now there are a lot of language files
   * [fcd94c6] debian/control: Remove outdated packages from Depends,
     Suggests, and Conflicts
   * [9c28177] Updated to standards version 3.8.3 (No changes needed)
   * [700156e] Added a README.source (Debian Policy Manual section 4.14)
   * [13a98d5] Updated language files
   * [a86b72a] Do not install readme.html in doc, it doesn't contain any
     relevant information for Debian users
   * [25d4e8e] Updated copyright file
Checksums-Sha1: 
 9f680520b7ccce61a4401ddd837d6a59efd558d9 1216 wordpress_2.8.4-1.dsc
 af9a37283b25f26a3a3aa3a7c5db23222e18e0fc 2078669 wordpress_2.8.4.orig.tar.gz
 8bc994e83640e36f9a739486e84bd218f7d64dd4 3852042 wordpress_2.8.4-1.diff.gz
 a1e482c65537ae3d273e0fa425720ee8cd307bda 5310848 wordpress_2.8.4-1_all.deb
Checksums-Sha256: 
 397e00f684a67dfa6af21fb4b5615cb36e3323e53e8bc0b28f84e906d586316a 1216 wordpress_2.8.4-1.dsc
 5b08259749facb38a2209008e227f66c85e178fd502b7fdd5f39c2676d14ab6b 2078669 wordpress_2.8.4.orig.tar.gz
 ef632f66bc68092581801e346dfd60fdd88d63b7fffbaa67a8cc9243fb8e4347 3852042 wordpress_2.8.4-1.diff.gz
 be09c3b0018944f7ab9ae882248c38ad3ddbaf6db155267d81736967ec3fd39b 5310848 wordpress_2.8.4-1_all.deb
Files: 
 1428107568ad72c487fca54640b441ca 1216 web optional wordpress_2.8.4-1.dsc
 0e8b296d4e2d4189b349f1d0f727bd98 2078669 web optional wordpress_2.8.4.orig.tar.gz
 18914f430c325e358d6ec2d289cc1cb2 3852042 web optional wordpress_2.8.4-1.diff.gz
 484ea91b14988e0611df7173c8d3a80c 5310848 web optional wordpress_2.8.4-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkqKTnQACgkQNxpp46476apxpQCeIvJ//6U6kqMy7rezZZMGJoGj
O0IAn0kbHE5wyCH6CWj7Ak1WFlWXuBUk
=+7wh
-----END PGP SIGNATURE-----





Information forwarded to debian-bugs-dist@lists.debian.org, Giuseppe Iuculano <giuseppe@iuculano.it>:
Bug#500295; Package wordpress. (Thu, 20 Aug 2009 21:51:03 GMT) (full text, mbox, link).


Acknowledgement sent to Matthew Carroll <m@tthew.org.uk>:
Extra info received and forwarded to list. Copy sent to Giuseppe Iuculano <giuseppe@iuculano.it>. (Thu, 20 Aug 2009 21:51:03 GMT) (full text, mbox, link).


Message #33 received at 500295@bugs.debian.org (full text, mbox, reply):

From: Matthew Carroll <m@tthew.org.uk>
To: Debian Bug Tracking System <500295@bugs.debian.org>
Subject: wordpress: Fix creates problems for sym-linked config files
Date: Thu, 20 Aug 2009 23:48:52 +0200
Package: wordpress
Version: 2.8.4-1
Followup-For: Bug #500295


This upgrade broke all of our wordpress instances, as the config files for each
site are sym-linked from /etc/wordpress to separate locations for each site.

Perhaps there is a better way of fixing this injection vulnerability that still
allows sym-linked config files? If not, then at a minimum users should be
notified of the change before the upgrade (news?) so breakages can be avoided.

Thanks
Matthew

-- System Information:
Debian Release: 5.0.2
  APT prefers stable
  APT policy: (990, 'stable'), (700, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.ISO-8859-15, LC_CTYPE=en_US.ISO-8859-15 (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages wordpress depends on:
ii  apache2            2.2.9-10+lenny4       Apache HTTP Server metapackage
ii  apache2-mpm-prefor 2.2.9-10+lenny4       Apache HTTP Server - traditional n
ii  libapache2-mod-php 5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti
ii  libjs-cropper      1.2.0-1               JavaScript image cropper UI
ii  libjs-jquery       1.2.6-2               JavaScript library for dynamic web
ii  libjs-prototype    1.6.0.2-4             JavaScript Framework for dynamic w
ii  libjs-scriptaculou 1.8.1-5               JavaScript library for dynamic web
ii  libphp-phpmailer   1.73-6                full featured email transfer class
ii  libphp-snoopy      1.2.4-1               Snoopy is a PHP class that simulat
ii  mysql-client       5.0.51a-24+lenny1     MySQL database client (metapackage
ii  mysql-client-5.0 [ 5.0.51a-24+lenny1     MySQL database client binaries
ii  php-gettext        1.0.7-6               read gettext MO files directly, wi
ii  php5               5.2.6.dfsg.1-1+lenny3 server-side, HTML-embedded scripti
ii  php5-gd            5.2.6.dfsg.1-1+lenny3 GD module for php5
ii  php5-mysql         5.2.6.dfsg.1-1+lenny3 MySQL module for php5
ii  tinymce            3.2.1.1-0.1           platform independent web based Jav

wordpress recommends no packages.

Versions of packages wordpress suggests:
ii  mysql-server           5.0.51a-24+lenny1 MySQL database server (metapackage
ii  mysql-server-5.0 [mysq 5.0.51a-24+lenny1 MySQL database server binaries

-- no debconf information




Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#500295; Package wordpress. (Wed, 26 Aug 2009 12:52:32 GMT) (full text, mbox, link).


Acknowledgement sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
Extra info received and forwarded to list. (Wed, 26 Aug 2009 12:52:32 GMT) (full text, mbox, link).


Message #38 received at 500295@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <giuseppe@iuculano.it>
To: Matthew Carroll <m@tthew.org.uk>, 500295@bugs.debian.org
Subject: Re: Bug#500295: wordpress: Fix creates problems for sym-linked config files
Date: Wed, 26 Aug 2009 14:11:37 +0200
[Message part 1 (text/plain, inline)]
Hi,

Matthew Carroll ha scritto:
> This upgrade broke all of our wordpress instances, as the config files for each
> site are sym-linked from /etc/wordpress to separate locations for each site.
> 
> Perhaps there is a better way of fixing this injection vulnerability that still
> allows sym-linked config files? If not, then at a minimum users should be
> notified of the change before the upgrade (news?) so breakages can be avoided.

I will add a note about that in NEWS and README.Debian.

Cheers,
Giuseppe.

[signature.asc (application/pgp-signature, attachment)]

Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 24 Sep 2009 07:50:55 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 19:03:15 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.