Vanilla 1 is no longer supported or maintained. If you need a copy, you can get it here.
HackerOne users: Testing against this community violates our program's Terms of Service and will result in your bounty being denied.
Bugtraq report of Vanilla 1.0.1 security vulnerability
Doesn't anyone here read Bugtraq?
http://seclists.org/bugtraq/2006/Jul/0409.html
Nobody responded to these accusations at all. I e-mailed SecurityFocus.com (they tend to be the most popular repository/database of security vulnerabilities) refuting the claims made by the person posting about the vulnerability.
Now first off, there's no such thing as Vanilla 1.0.1. Were they looking at the Subversion repository checkout version?
Second off, I looked at the code and the $RootDirectory variable is set just a few lines above in the Vanilla 1 source. It's set based on a getcwd() call, so there's no chance for user input. Someone would have to delete those two lines and then turn on register_globals for this to be a vulnerability. wtf?
0
This discussion has been closed.
Comments
I'm one guy doing all of this stuff - there's only so much I can do. I'm trying to rely more on this community to watch stuff like that and dispute it if necessary. So, thanks for pointing it out, and please go ahead and dispute it.
Actually, I wouldn't even know how to go about replying to that.
http://www.securityfocus.com/bid/19127/info
To whom it may concern,
I am writing with regard to the so-called "vulnerability" in the Vanilla application that has been discussed on your site at:
http://www.securityfocus.com/bid/19127/info
Here is the code in question:
$WorkingDirectory = str_replace('\\', '/', getcwd()).'/';
$RootDirectory = str_replace('setup/', '', $WorkingDirectory);
// ...
// Include the old settings file if it is present (it just contains constants)
if (file_exists($RootDirectory.'conf/old_settings.php')) {
include($RootDirectory.'conf/old_settings.php');
As you can see, there is NO vulnerability. The variable used in the path is defined a few lines above the code from the original report, and is defined using PHP's getcwd(); function. There is absolutely NO user-input that could cause the vulnerability suggested, and the "proof of concept" provided cannot possibly work.
We ask that you please correct this information ASAP as it incorrectly casts bad light on our product.
Kind Regards,
Mark O'Sullivan
http://lussumo.com
http://getvanilla.com
http://markosullivan.ca
You know, you'd think they'd screen these things for accuracy before publishing them. Otherwise, it's extremely rude, to say the least. The fact that you also were not contacted directly and privately first - to give you reasonable time to create a patch for this non-existent security hole - makes it doubly so. Talk about shirking responsibility. If you were charging for your product, that could even cost you in lost sales and irate customers. Crap like that gets my ire up. >:/ "No charge"? or is it perhaps "priceless"? ;p