TUCoPS :: Web :: PHP :: bt1725.txt

PHPlist, file injection vulnerability



PHPlist, http://www.phplist.com is a popular open source newsletter 
application written in PHP.

Recently a file injection vulnerability has been discovered allowing 
remote attackers to issue arbitrary commands on the hosted machine, as 
the webserver user.
The issue has been resolved in the latest release, version 2.6.4 
available at http://www.phplist.com/files

Versions affected: any version up to 2.6.2

If Apache is used, the following .htacces file in the "admin" directory 
will patch the problem for any affected version, provided the server 
permissions allow overriding the relevant directives

<FilesMatch "\.(php|inc)$">
Order allow,deny
deny from all
</FilesMatch>
<FilesMatch "index.php$">
Order allow,deny
allow from all
</FilesMatch>

Michiel Dethmers

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH