DSA-346-1 phpsysinfo -- directory traversal

Related Vulnerabilities: CVE-2003-0536  

Albert Puigsech Galicia ripe@7a69ezine.org reported that phpsysinfo, a web-based program to display status information about the system, contains two vulnerabilities which could allow local files to be read, or arbitrary PHP code to be executed, under the privileges of the web server process (usually www-data). These vulnerabilities require access to a writable directory on the system in order to be exploited. For the stable distribution (woody) this problem has been fixed in version 2.0-3woody1. For the unstable distribution (sid) this problem will be fixed soon. See Debian bug #200543. We recommend that you update your phpsysinfo package.

Debian Security Advisory

DSA-346-1 phpsysinfo -- directory traversal

Date Reported:
08 Jul 2003
Affected Packages:
phpsysinfo
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 7275, BugTraq ID 7286.
In Mitre's CVE dictionary: CVE-2003-0536.
More information:

Albert Puigsech Galicia ripe@7a69ezine.org reported that phpsysinfo, a web-based program to display status information about the system, contains two vulnerabilities which could allow local files to be read, or arbitrary PHP code to be executed, under the privileges of the web server process (usually www-data). These vulnerabilities require access to a writable directory on the system in order to be exploited.

For the stable distribution (woody) this problem has been fixed in version 2.0-3woody1.

For the unstable distribution (sid) this problem will be fixed soon. See Debian bug #200543.

We recommend that you update your phpsysinfo package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/p/phpsysinfo/phpsysinfo_2.0-3woody1.dsc
http://security.debian.org/pool/updates/main/p/phpsysinfo/phpsysinfo_2.0-3woody1.diff.gz
http://security.debian.org/pool/updates/main/p/phpsysinfo/phpsysinfo_2.0.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/p/phpsysinfo/phpsysinfo_2.0-3woody1_all.deb

MD5 checksums of the listed files are available in the original advisory.