mahara-contributors team mailing list archive
-
mahara-contributors team
-
Mailing list archive
-
Message #12161
[Bug 1047111] A change has been merged
Reviewed: https://reviews.mahara.org/2102
Committed: http://gitorious.org/mahara/mahara/commit/f33d4cef66356d3fd96c54bde58bee983d6e61a1
Submitter: Aaron Wells (aaronw@xxxxxxxxxxxxxxx)
Branch: master
commit f33d4cef66356d3fd96c54bde58bee983d6e61a1
Author: Aaron Wells <aaronw@xxxxxxxxxxxxxxx>
Date: Wed May 1 14:16:23 2013 +1200
Documenting safe usage of simplexml_load_file()
Bug1047111
Change-Id: I850603dbc1d85f4360ce227d2658e5abb51af1aa
--
You received this bug notification because you are a member of Mahara
Contributors, which is subscribed to Mahara.
Matching subscriptions: Subscription for all Mahara Contrib members
https://bugs.launchpad.net/bugs/1047111
Title:
XEE possible in mahara
Status in Mahara ePortfolio:
Fix Released
Status in Mahara 1.4 series:
Fix Released
Status in Mahara 1.5 series:
Fix Released
Bug description:
There is a security issue with the default XML parser for PHP, where ENTITY fields are
loaded and substituted in text parts.
This allows possible attackers to read from internal networks, or files readable by the
web server user.
This includes reading of the config.php file, which contains sensitive information such
as the database password, and the password salt field.
The fix for this was to include a call to libxml_disable_entity_loader(true) during the
initialization of a page.
More information can be found at the following:
http://projects.webappsec.org/w/page/13247003/XML%20External%20Entities
http://websec.io/2012/08/27/Preventing-XEE-in-PHP.html
Reported by Mike Haworth.
To manage notifications about this bug go to:
https://bugs.launchpad.net/mahara/+bug/1047111/+subscriptions