FreeBSD : suPHP -- Privilege escalation (2fbfd455-f2d0-11e2-8a46-000d601460a4)

High Nessus Plugin ID 69008


The remote FreeBSD host is missing a security-related update.


suPHP developer Sebastian Marsching reports :

When the suPHP_PHPPath was set, mod_suphp would use the specified PHP executable to pretty-print PHP source files (MIME type x-httpd-php-source or application/x-httpd-php-source).

However, it would not sanitize the environment. Thus a user that was allowed to use the SetEnv directive in a .htaccess file (AllowOverride FileInfo) could make PHP load a malicious configuration file (e.g.
loading malicious extensions).

As the PHP process for highlighting the source file was run with the privileges of the user Apache HTTPd was running as, a local attacker could probably execute arbitrary code with the privileges of this user.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 69008

File Name: freebsd_pkg_2fbfd455f2d011e28a46000d601460a4.nasl

Version: $Revision: 1.1 $

Type: local

Published: 2013/07/23

Modified: 2013/07/23

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:suphp, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2013/07/22

Vulnerability Publication Date: 2013/05/20