summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--doc/source/features.rst30
1 files changed, 25 insertions, 5 deletions
diff --git a/doc/source/features.rst b/doc/source/features.rst
index 3aab1a0..3643326 100644
--- a/doc/source/features.rst
+++ b/doc/source/features.rst
@@ -25,7 +25,9 @@ Unfortunately, passing user-controlled parameters to it often leads to arbitrary
25We're mitigating it by filtering the ``$``, ``|``, ``;``, `````, ``\n`` and ``&`` chars in our 25We're mitigating it by filtering the ``$``, ``|``, ``;``, `````, ``\n`` and ``&`` chars in our
26default configuration, making it a lot harder for an attacker to inject arbitrary commands. 26default configuration, making it a lot harder for an attacker to inject arbitrary commands.
27 27
28This family of vulnerabilities lead to various CVE entries, like: 28
29Examples of related vulnerabilities
30"""""""""""""""""""""""""""""""""""
29 31
30- `CVE-2017-7981 <https://tuleap.net/plugins/tracker/?aid=10159>`_: Authenticated remote code execution on Tuleap 32- `CVE-2017-7981 <https://tuleap.net/plugins/tracker/?aid=10159>`_: Authenticated remote code execution on Tuleap
31- `CVE-2014-4688 <https://www.pfsense.org/security/advisories/pfSense-SA-14_10.webgui.asc>`_: Authenticated remote code execution on pfSense 33- `CVE-2014-4688 <https://www.pfsense.org/security/advisories/pfSense-SA-14_10.webgui.asc>`_: Authenticated remote code execution on pfSense
@@ -50,7 +52,9 @@ often meaning an arbitrary code execution.
50 52
51We're killing it by preventing any extra options in additional_parameters. 53We're killing it by preventing any extra options in additional_parameters.
52 54
53This family of vulnerabilities lead to various CVE, like: 55
56Examples of related vulnerabilities
57"""""""""""""""""""""""""""""""""""
54 58
55- `CVE-2017-7692 <https://legalhackers.com/advisories/SquirrelMail-Exploit-Remote-Code-Exec-CVE-2017-7692-Vuln.html>`_: Authenticated remote code execution in SquirrelMail 59- `CVE-2017-7692 <https://legalhackers.com/advisories/SquirrelMail-Exploit-Remote-Code-Exec-CVE-2017-7692-Vuln.html>`_: Authenticated remote code execution in SquirrelMail
56- `CVE-2016-10074 <https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html>`_: remote code execution in SwiftMailer 60- `CVE-2016-10074 <https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html>`_: remote code execution in SwiftMailer
@@ -100,6 +104,16 @@ inside the script to ensure the file doesn't contain any valid PHP code, with so
100 104
101 $ php -d vld.execute=0 -d vld.active=1 -d extension=vld.so $file 105 $ php -d vld.execute=0 -d vld.active=1 -d extension=vld.so $file
102 106
107
108Examples of related vulnerabilities
109"""""""""""""""""""""""""""""""""""
110
111- `CVE-2017-6090 <https://sysdream.com/news/lab/2017-09-29-cve-2017-6090-phpcollab-2-5-1-arbitrary-file-upload-unauthenticated/>`_: Unauthenticated remote code execution in PhpCollab
112- `EDB-38407 <https://www.exploit-db.com/exploits/38407/>`_: Authenticated remote code execution in GLPI
113- `CVE-2013-5576 <https://developer.joomla.org/security/news/563-20130801-core-unauthorised-uploads>`_: Authenticated remote code execution in Joomla
114- `EDB-19154 <https://www.rapid7.com/db/modules/exploit/multi/http/qdpm_upload_exec>`_: Authenticated remote code execution in qdPM
115
116
103Unserialize-related magic 117Unserialize-related magic
104^^^^^^^^^^^^^^^^^^^^^^^^^ 118^^^^^^^^^^^^^^^^^^^^^^^^^
105 119
@@ -136,7 +150,9 @@ issues related to the complexity of ``unserialize``'s implementation,
136and the amount of control if provides to an attacker, like `CVE-2016-9137, CVE-2016-9138 <https://bugs.php.net/bug.php?id=73147>`_, 150and the amount of control if provides to an attacker, like `CVE-2016-9137, CVE-2016-9138 <https://bugs.php.net/bug.php?id=73147>`_,
137`2016-7124 <https://bugs.php.net/bug.php?id=72663>`_, `CVE-2016-5771 and CVE-2016-5773 <https://www.evonide.com/how-we-broke-php-hacked-pornhub-and-earned-20000-dollar/>`_. 151`2016-7124 <https://bugs.php.net/bug.php?id=72663>`_, `CVE-2016-5771 and CVE-2016-5773 <https://www.evonide.com/how-we-broke-php-hacked-pornhub-and-earned-20000-dollar/>`_.
138 152
139This family of vulnerabilities lead to various CVE, like: 153
154Examples of related vulnerabilities
155"""""""""""""""""""""""""""""""""""
140 156
141- `CVE-2016-???? <https://www.computest.nl/advisories/CT-2016-1110_Observium.txt>`_: Unauthenticated remote code execution in Observium (leading to remote root) 157- `CVE-2016-???? <https://www.computest.nl/advisories/CT-2016-1110_Observium.txt>`_: Unauthenticated remote code execution in Observium (leading to remote root)
142- `CVE-2016-5726 <http://seclists.org/oss-sec/2016/q2/521>`_: Unauthenticated remote code execution in Simple Machines Forums 158- `CVE-2016-5726 <http://seclists.org/oss-sec/2016/q2/521>`_: Unauthenticated remote code execution in Simple Machines Forums
@@ -179,7 +195,9 @@ This is of course addressed as well by the ``harden_rand`` feature.
179 Activating this feature will raise an `Error <https://secure.php.net/manual/en/class.error.php>`_ 195 Activating this feature will raise an `Error <https://secure.php.net/manual/en/class.error.php>`_
180 exception if ``min`` is superior to ``max``, while the default dehaviour is simply to swap them. 196 exception if ``min`` is superior to ``max``, while the default dehaviour is simply to swap them.
181 197
182This family of vulnerabilities lead to various CVE, like: 198
199Examples of related vulnerabilities
200"""""""""""""""""""""""""""""""""""
183 201
184- `CVE-2015-5267 <https://moodle.org/mod/forum/discuss.php?d=320291>`_: Unauthenticated accounts takeover in in Moodle 202- `CVE-2015-5267 <https://moodle.org/mod/forum/discuss.php?d=320291>`_: Unauthenticated accounts takeover in in Moodle
185- `CVE-2014-9624 <https://www.mantisbt.org/bugs/view.php?id=17984>`_: Captcha bypass in MantisBT 203- `CVE-2014-9624 <https://www.mantisbt.org/bugs/view.php?id=17984>`_: Captcha bypass in MantisBT
@@ -211,7 +229,9 @@ the `libxml_disable_entity_loader <https://secure.php.net/manual/en/function.lib
211function with its parameter set to ``true`` at startup, 229function with its parameter set to ``true`` at startup,
212and then *nop'ing* it, so it won't do anything if ever called again. 230and then *nop'ing* it, so it won't do anything if ever called again.
213 231
214This family of vulnerabilities lead to various CVE vulnerabilities, like: 232
233Examples of related vulnerabilities
234"""""""""""""""""""""""""""""""""""
215 235
216- `CVE-2015-5161 <https://legalhackers.com/advisories/eBay-Magento-XXE-Injection-Vulnerability.html>`_: Unauthenticated arbitrary file disclosure on Magento 236- `CVE-2015-5161 <https://legalhackers.com/advisories/eBay-Magento-XXE-Injection-Vulnerability.html>`_: Unauthenticated arbitrary file disclosure on Magento
217- `CVE-2014-8790 <https://github.com/GetSimpleCMS/GetSimpleCMS/issues/944>`_: Unauthenticated remote code execution in GetSimple CMS 237- `CVE-2014-8790 <https://github.com/GetSimpleCMS/GetSimpleCMS/issues/944>`_: Unauthenticated remote code execution in GetSimple CMS