[32435] in bugtraq

home help back first fref pref prev next nref lref last post

PHPlist, file injection vulnerability

daemon@ATHENA.MIT.EDU (Michiel Dethmers)
Fri Nov 14 15:00:42 2003

Message-ID: <3FB4EBAE.5090007@kipu.co.uk>
Date: Fri, 14 Nov 2003 14:50:22 +0000
From: Michiel Dethmers <secfoc@kipu.co.uk>
MIME-Version: 1.0
To: bugtraq@securityfocus.com
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit


PHPlist, http://www.phplist.com is a popular open source newsletter 
application written in PHP.

Recently a file injection vulnerability has been discovered allowing 
remote attackers to issue arbitrary commands on the hosted machine, as 
the webserver user.
The issue has been resolved in the latest release, version 2.6.4 
available at http://www.phplist.com/files

Versions affected: any version up to 2.6.2

If Apache is used, the following .htacces file in the "admin" directory 
will patch the problem for any affected version, provided the server 
permissions allow overriding the relevant directives

<FilesMatch "\.(php|inc)$">
Order allow,deny
deny from all
</FilesMatch>
<FilesMatch "index.php$">
Order allow,deny
allow from all
</FilesMatch>

Michiel Dethmers


home help back first fref pref prev next nref lref last post