Home page logo

oss-sec logo oss-sec mailing list archives

Re: CVE Request: Juju phpmyadmin charm
From: Seth Arnold <seth.arnold () canonical com>
Date: Wed, 29 Jan 2014 16:08:19 -0800

On Thu, Jan 30, 2014 at 10:51:48AM +1100, dawg wrote:

The second (replacement) argument passed to preg_replace is empty : it
doesn't use matched input. This can't be exploited.

Thanks dawg for finding my mistake.

I retract this CVE request.



$ php -r 'print(preg_replace("/(.*)/e","","phpinfo();"));'
=> Nothing

$ php -r 'print(preg_replace("/(.*)/e","$1","phpinfo();"));'
=> phpinfo() get executed


Le 30/01/2014 10:16, Seth Arnold a écrit :
Hello Kurt, vendors, MITRE,

Please assign a CVE for the following issue:

I discovered a potentially unsafe use of PHP's preg_replace() /e option in
the Juju charm phpmyadmin:

$xml = simplexml_load_string(preg_replace("/(<\/?)media\:content([^>]*>)/e",
    '', str_replace('media:hash',

An attacker able to spoof ARP, DNS, or BGP, or control any of the routers
between the client and sourceforge.net, or control over the sourceforge
project or sourceforge servers, would be in a position to insert likely
aribtrary code into the PHP interpreter.

The full source of this file can be found at:


I have reported the bug to:


The problem appears to have been introduced in revision 18. No fix is
currently available.


Attachment: signature.asc
Description: Digital signature

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]