The LOB functionality in PEAR MDB2 before 2.5.0a1 interprets a request to store a URL string as a request to retrieve and store the contents of the URL, which might allow remote attackers to use MDB2 as an indirect proxy or obtain sensitive information via a URL into a form field in an MDB2 application, as demonstrated by a file:// URL or a URL for an intranet web site.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/26382 | vdb entry |
http://bugs.gentoo.org/show_bug.cgi?id=198446 | |
http://pear.php.net/package/MDB2/download/2.5.0a1 | |
http://osvdb.org/42107 | vdb entry |
http://security.gentoo.org/glsa/glsa-200712-05.xml | vendor advisory |
http://pear.php.net/bugs/bug.php?id=10024 | |
http://secunia.com/advisories/27983 | third party advisory |
http://secunia.com/advisories/27626 | third party advisory |
http://marc.info/?l=pear-cvs&m=117823082829114&w=2 | mailing list |
http://secunia.com/advisories/27572 | third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00434.html | vendor advisory |
http://www.vupen.com/english/advisories/2007/3806 | vdb entry |