From b8dd5ce7f5d36c969944d425ff1fbe5f200a1dc8 Mon Sep 17 00:00:00 2001 From: jvoisin Date: Tue, 10 Oct 2017 23:53:15 +0200 Subject: Improve the layout of the related vulns in the documentation --- doc/source/features.rst | 30 +++++++++++++++++++++++++----- 1 file changed, 25 insertions(+), 5 deletions(-) diff --git a/doc/source/features.rst b/doc/source/features.rst index 3aab1a0..3643326 100644 --- a/doc/source/features.rst +++ b/doc/source/features.rst @@ -25,7 +25,9 @@ Unfortunately, passing user-controlled parameters to it often leads to arbitrary We're mitigating it by filtering the ``$``, ``|``, ``;``, `````, ``\n`` and ``&`` chars in our default configuration, making it a lot harder for an attacker to inject arbitrary commands. -This family of vulnerabilities lead to various CVE entries, like: + +Examples of related vulnerabilities +""""""""""""""""""""""""""""""""""" - `CVE-2017-7981 `_: Authenticated remote code execution on Tuleap - `CVE-2014-4688 `_: Authenticated remote code execution on pfSense @@ -50,7 +52,9 @@ often meaning an arbitrary code execution. We're killing it by preventing any extra options in additional_parameters. -This family of vulnerabilities lead to various CVE, like: + +Examples of related vulnerabilities +""""""""""""""""""""""""""""""""""" - `CVE-2017-7692 `_: Authenticated remote code execution in SquirrelMail - `CVE-2016-10074 `_: remote code execution in SwiftMailer @@ -100,6 +104,16 @@ inside the script to ensure the file doesn't contain any valid PHP code, with so $ php -d vld.execute=0 -d vld.active=1 -d extension=vld.so $file + +Examples of related vulnerabilities +""""""""""""""""""""""""""""""""""" + +- `CVE-2017-6090 `_: Unauthenticated remote code execution in PhpCollab +- `EDB-38407 `_: Authenticated remote code execution in GLPI +- `CVE-2013-5576 `_: Authenticated remote code execution in Joomla +- `EDB-19154 `_: Authenticated remote code execution in qdPM + + Unserialize-related magic ^^^^^^^^^^^^^^^^^^^^^^^^^ @@ -136,7 +150,9 @@ issues related to the complexity of ``unserialize``'s implementation, and the amount of control if provides to an attacker, like `CVE-2016-9137, CVE-2016-9138 `_, `2016-7124 `_, `CVE-2016-5771 and CVE-2016-5773 `_. -This family of vulnerabilities lead to various CVE, like: + +Examples of related vulnerabilities +""""""""""""""""""""""""""""""""""" - `CVE-2016-???? `_: Unauthenticated remote code execution in Observium (leading to remote root) - `CVE-2016-5726 `_: Unauthenticated remote code execution in Simple Machines Forums @@ -179,7 +195,9 @@ This is of course addressed as well by the ``harden_rand`` feature. Activating this feature will raise an `Error `_ exception if ``min`` is superior to ``max``, while the default dehaviour is simply to swap them. -This family of vulnerabilities lead to various CVE, like: + +Examples of related vulnerabilities +""""""""""""""""""""""""""""""""""" - `CVE-2015-5267 `_: Unauthenticated accounts takeover in in Moodle - `CVE-2014-9624 `_: Captcha bypass in MantisBT @@ -211,7 +229,9 @@ the `libxml_disable_entity_loader `_: Unauthenticated arbitrary file disclosure on Magento - `CVE-2014-8790 `_: Unauthenticated remote code execution in GetSimple CMS -- cgit v1.3