Ansgar Burchardt
2011-Aug-11 21:36 UTC
[Secure-testing-team] Bug#637477: possibly allows shell injection
Package: src:dtc Version: 0.29.17-1 Severity: critical Tags: security Hi, shared/inc/sql/lists.php includes code like if ($_REQUEST[$tunable_name]!=""){ //i write in the file $write_line = "echo ".$_REQUEST[$tunable_name]." > ".$option_file; exec($write_line); }else{ //i remove the file and does not seem to check the contents of $_REQUEST for sanity as far as I can see. (I did not try actually using it as I do not have dtc setup.) Regards, Ansgar