-
Notifications
You must be signed in to change notification settings - Fork 210
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2015-2171 #837
Comments
Before you go making bold claims like this please research them. While this is an issue it does not affect us as we aren't using session cookies with slim |
Pay no attention to the man behind the curtain. Everything is fine. this-is-fine.jpg https://github.com/samilliken/openDCIM/search?utf8=%E2%9C%93&q=unserialize This just shows a more serious problem: You're not keeping your dependencies up to date. This is more serious problem than it first appears. But by all means, continue to bury your head in the sand. I only opened an issue here because HN users tried to guilt me into it. I'm not a user of this software, so any security snafus made here aren't really my business. |
Please feel free to open an issue when you find an actual problem. Playing peekaboo for a specific commands with no understanding of the code itself would be like me pointing at Congress and saying "misappropriation". While it might be happening you can't fix it without a specific information set to work from. All you've done is make an accusation and distract me from whatever I was thinking about. |
I just outlined the actual problem:
Your process (or perhaps the lack thereof) will fail your users. That is an actual problem, and the one you may want to actually spend time thinking about. But I'm not here to help, I'm here to fulfill a moral obligation so no one can say I didn't try. Consider my effort concluded. (Also, if you can in any way help it, just stop using |
You've outlined your perceived problem. You want to help them submit code updates and correct the issues. Otherwise your opinion has been noted and appropriately filed in the bin.
|
This is really something that should have been done all along. Most PHP projects have moved to Composer (and https://github.com/Roave/SecurityAdvisories for that matter) to make this easier. I hope, should OpenDCIM's inability to keep dependencies up to date even when security vulnerabilities are fixed upstream lead to a government agency getting owned up, no one on your team gets held liable in any capacity. And with that, I'm out. |
Why are you publishing code that had a public PHP object injection (read: possible remote code execution) vulnerability that was fixed over a year ago?
More importantly: Why are you deploying this vulnerable code to systems used by US government agencies?
The text was updated successfully, but these errors were encountered: