Name | CVE-2008-5186 |
Description | The set_language_path function in geshi.php in Generic Syntax Highlighter (GeSHi) before 1.0.8.1 might allow remote attackers to conduct file inclusion attacks via crafted inputs that influence the default language path ($path variable). NOTE: this issue has been disputed by a vendor, stating that only a static value is used, so this is not a vulnerability in GeSHi. Separate CVE identifiers would be created for web applications that integrate GeSHi in a way that allows control of the default language path |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DTSA-179-1 |
Debian Bugs | 504445, 504681, 504682 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
dokuwiki (PTS) | bullseye | 0.0.20180422.a-2.1 | fixed |
| bookworm | 0.0.20220731.a-2 | fixed |
| sid, trixie | 0.0.20220731.a-3 | fixed |
geshi (PTS) | sid, trixie, bookworm, bullseye | 1.0.9.1-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
its rather an application bug if the input to set_language_path is unfiltered user input
http://comments.gmane.org/gmane.comp.security.oss.general/1152
DokuWiki passes a static string to $path parameter
pgfouine too does not override default language files path