Your message dated Mon, 19 Dec 2011 10:54:21 +0800 with message-id <[email protected]> and subject line Also fixed in Lenny has caused the Debian Bug report #637477, regarding possibly allows shell injection to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 637477: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637477 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: src:dtc Version: 0.29.17-1 Severity: critical Tags: security Hi, shared/inc/sql/lists.php includes code like if ($_REQUEST[$tunable_name]!=""){ //i write in the file $write_line = "echo ".$_REQUEST[$tunable_name]." > ".$option_file; exec($write_line); }else{ //i remove the file and does not seem to check the contents of $_REQUEST for sanity as far as I can see. (I did not try actually using it as I do not have dtc setup.) Regards, Ansgar
--- End Message ---
--- Begin Message ---
--- End Message ---

