CVE-2015-5723

NameCVE-2015-5723
DescriptionDoctrine Annotations before 1.2.7, Cache before 1.3.2 and 1.4.x before 1.4.2, Common before 2.4.3 and 2.5.x before 2.5.1, ORM before 2.4.8 or 2.5.x before 2.5.1, MongoDB ODM before 1.0.2, and MongoDB ODM Bundle before 3.0.1 use world-writable permissions for cache directories, which allows local users to execute arbitrary PHP code with additional privileges by leveraging an application with the umask set to 0 and that executes cache entries as code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3369-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
aws-sdk-for-php (PTS)jessie2.7.2-1fixed
doctrine (PTS)jessie2.4.6-1+deb8u1fixed
stretch2.5.4+dfsg-2fixed
buster2.6.3+dfsg-1fixed
bullseye2.8.1+dfsg-3fixed
bookworm2.14.1+dfsg-1fixed
sid, trixie2.20.0+dfsg-1fixed
php-doctrine-annotations (PTS)jessie1.2.1-1+deb8u1fixed
stretch1.2.7-2fixed
buster1.5.0really1.2.7-1fixed
bullseye1.11.2-1+deb11u1fixed
bookworm2.0.1-1+deb12u1fixed
sid, trixie2.0.2-1fixed
php-doctrine-bundle (PTS)stretch1.6.7-1fixed
buster1.10.2-1fixed
bullseye2.2.3-1fixed
php-doctrine-cache (PTS)jessie1.3.1-1+deb8u1fixed
stretch1.6.1-1fixed
buster1.8.0-1fixed
bullseye1.10.2-2fixed
bookworm2.2.0-1fixed
sid, trixie2.2.0-4fixed
php-doctrine-common (PTS)jessie2.4.2-2+deb8u1fixed
stretch2.6.1-2fixed
buster2.10.0-1fixed
bullseye3.1.1-1fixed
bookworm3.4.3-1fixed
sid, trixie3.4.5-1fixed
zendframework (PTS)jessie, jessie (lts)1.12.9+dfsg-2+deb8u7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
aws-sdk-for-phpsourceexperimental3.2.1-1
aws-sdk-for-phpsource(unstable)(not affected)
doctrinesourceexperimental2.5.1+dfsg-1
doctrinesourcejessie2.4.6-1+deb8u1
doctrinesource(unstable)2.4.8-1low
php-doctrine-annotationssourcejessie1.2.1-1+deb8u1
php-doctrine-annotationssource(unstable)1.2.7-1low
php-doctrine-bundlesource(unstable)1.5.2-1low
php-doctrine-cachesourcejessie1.3.1-1+deb8u1
php-doctrine-cachesource(unstable)1.4.2-1low
php-doctrine-commonsourceexperimental2.5.1-1
php-doctrine-commonsourcejessie2.4.2-2+deb8u1
php-doctrine-commonsource(unstable)2.4.3-1low
zendframeworksourcesqueeze(not affected)
zendframeworksourcewheezy1.11.13-1.1+deb7u4DSA-3369-1
zendframeworksourcejessie1.12.9+dfsg-2+deb8u4DSA-3369-1
zendframeworksource(unstable)1.12.16+dfsg-1low

Notes

[wheezy] - doctrine <no-dsa> (Minor issue)
[squeeze] - doctrine <no-dsa> (Minor issue)
- aws-sdk-for-php <not-affected> (Vulnerable code not present)
[squeeze] - zendframework <not-affected> (No unsafe permissions found in cache functions)
Review of zendframework 1.10.6 in Squeeze found no usage of default unsafe permission except in library/Zend/Search/Lucene/Storage/Directory/Filesystem.php but which is unlikely to cause a security issue.
http://www.doctrine-project.org/2015/08/31/security_misconfiguration_vulnerability_in_various_doctrine_projects.html
https://github.com/aws/aws-sdk-php/releases/tag/3.2.1
http://framework.zend.com/security/advisory/ZF2015-07

Search for package or bug name: Reporting problems