Debian DLA-1593-1 : phpbb3 security update

high Nessus Plugin ID 119121

Synopsis

The remote Debian host is missing a security update.

Description

Simon Scannell and Robin Peraglie of RIPS Technologies discovered that passing an absolute path to a file_exists check in phpBB, a full featured web forum, allows remote code execution through Object Injection by employing Phar deserialization when an attacker has access to the Admin Control Panel with founder permissions.

The fix for this issue resulted in the removal of setting the ImageMagick path. The GD image library can be used as a replacement and a new event to generate thumbnails was added, so it is possible to write an extension that uses a different image library to generate thumbnails.

For Debian 8 'Jessie', this problem has been fixed in version 3.0.12-5+deb8u2.

We recommend that you upgrade your phpbb3 packages.

NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Upgrade the affected phpbb3, and phpbb3-l10n packages.

See Also

https://lists.debian.org/debian-lts-announce/2018/11/msg00029.html

https://packages.debian.org/source/jessie/phpbb3

Plugin Details

Severity: High

ID: 119121

File Name: debian_DLA-1593.nasl

Version: 1.4

Type: local

Agent: unix

Published: 11/26/2018

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:phpbb3, p-cpe:/a:debian:debian_linux:phpbb3-l10n, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 11/24/2018

Reference Information

CVE: CVE-2018-19274