Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is there a 2.x patch for security issue CVE-2015-8379? #9160

Closed
SimonEast opened this issue Jul 25, 2016 · 6 comments
Closed

Is there a 2.x patch for security issue CVE-2015-8379? #9160

SimonEast opened this issue Jul 25, 2016 · 6 comments
Milestone

Comments

@SimonEast
Copy link

After installing my CakePHP app on a new server I found it triggering mod_security (rule 241601) - it's trying to protect me from the CVE-2015-8379 security issue in CakePHP up to 3.1.5.

  1. I tried doing a search, but couldn't work out if (or when) this was patched in CakePHP 2.x. Has it been?
  2. If not, is there a simple tweak that can be made to existing code to fix this hole?
  3. Is anyone aware of the steps to prevent mod_security from 403ing these requests, other than disabling that particular rule?
@chinpei215
Copy link
Contributor

From the next time, please send an email to security [at] cakephp.org when you want to ask a question about security of CakePHP.

  1. This patch should solve the issue: 4b8d628
  2. SecRuleRemoveById

@ADmad ADmad modified the milestones: 2.9.0, 2.8.6 Jul 25, 2016
@markstory
Copy link
Member

2.7.9 was the first release that contained 4b8d628

@onlyjob
Copy link

onlyjob commented Jul 25, 2016

It would be great to mention CVEs on release notes...

@markstory
Copy link
Member

@onlyjob I agree. In this situation the CVE was claimed after the release was done, and we were not told about the CVE being claimed.

@ravage84
Copy link
Member

@markstory means the CVE should have been published with a correct statement which versions are affected and which are not. That would have answered @onlyjob's question implicitly.

@markstory
Copy link
Member

@ravage84 That would be nice too, but the original issue reporter claimed and filled out the CVE report as well.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants