PHPlist, file injection vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




PHPlist, http://www.phplist.com is a popular open source newsletter application written in PHP.


Recently a file injection vulnerability has been discovered allowing remote attackers to issue arbitrary commands on the hosted machine, as the webserver user.
The issue has been resolved in the latest release, version 2.6.4 available at http://www.phplist.com/files


Versions affected: any version up to 2.6.2

If Apache is used, the following .htacces file in the "admin" directory will patch the problem for any affected version, provided the server permissions allow overriding the relevant directives

<FilesMatch "\.(php|inc)$">
Order allow,deny
deny from all
</FilesMatch>
<FilesMatch "index.php$">
Order allow,deny
allow from all
</FilesMatch>

Michiel Dethmers


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux