openSUSE has issued an advisory on March 6: https://lists.opensuse.org/opensuse-updates/2019-03/msg00022.html The issue is fixed upstream in 10.8.4. Mageia 6 is also affected.
Whiteboard: (none) => MGA6TOO
CC: (none) => smelror
Assigning to all packagers collectively, since there is no registered maintainer for this package.
CC: (none) => marja11Assignee: bugsquad => pkg-bugs
Status comment: (none) => Fixed upstream in 10.8.4
Updated package uploaded for cauldron and Mageia 6. Advisory: ======================== Updated hiawatha package fixes security vulnerability: Verison 10.8.4 fixed a vulnerability which allowed a remote atacker to perform directory traversal when AllowDotFiles was enabled (CVE-2019-8358). References: https://lists.opensuse.org/opensuse-updates/2019-03/msg00022.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8358 ======================== Updated packages in core/updates_testing: ======================== hiawatha-10.8.4-1.mga6 from hiawatha-10.8.4-1.mga6.src.rpm Link to test procedure: https://bugs.mageia.org/show_bug.cgi?id=15391#c17
Keywords: (none) => has_procedureCC: (none) => mramboVersion: Cauldron => 6Assignee: pkg-bugs => qa-bugsWhiteboard: MGA6TOO => (none)
mga6, x86_64 Updated hiawatha, stopped apache, enabled and started hiawatha. $ systemctl status hiawatha ● hiawatha.service - Hiawatha Web Server Loaded: loaded (/usr/lib/systemd/system/hiawatha.service; enabled; vendor pre Active: active (running) since Tue 2019-03-12 22:31:57 GMT; 8s ago Process: 8550 ExecStartPre=/usr/sbin/hiawatha -k (code=exited, status=0/SUCCES Process: 8548 ExecStartPre=/usr/sbin/wigwam (code=exited, status=0/SUCCESS) Main PID: 8553 (hiawatha) CGroup: /system.slice/hiawatha.service └─8553 /usr/sbin/hiawatha -d Pointed firefox at localhost and saw the welcome message: Installation successful Congratulations! The Hiawatha webserver has successfully been installed on this system. For more information about this webserver, visit the Hiawatha website. [...] Visited some familiar weblinks like exoplanet.eu and APOD. Started a php server on port 8000 and successfully ran a sample php script at localhost:8000/ So far it looks fine. Did not make much headway with the tests referred to in comment 2 but shall have another look at them.
CC: (none) => tarazed25
Whiteboard: (none) => MGA6-64-OK
Keywords: (none) => advisory, validated_updateCC: (none) => davidwhodgins, sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2019-0112.html
Status: NEW => RESOLVEDResolution: (none) => FIXED