From: Kunal Mehta Date: Sat, 11 Nov 2017 00:53:24 +0000 (-0800) Subject: SECURITY: update.php: Remove eval-stdin.php if necessary X-Git-Tag: 1.31.0-rc.0~1510 X-Git-Url: https://git.heureux-cyclage.org/?p=lhc%2Fweb%2Fwiklou.git;a=commitdiff_plain;h=20fd11be7ad7899b8baa77dc267532dcecc5acb1 SECURITY: update.php: Remove eval-stdin.php if necessary If phpunit's eval-stdin.php file exists and is one of the vulnerable versions, delete it when running update.php as most people should run that when updating to a new release. If the unlink() call fails, we'll warn the user but continue with update.php processing and hope they've mitigated it in some other way. Bug: T180231 Change-Id: I5b838686ede9764083c52853cc05c52ea72739df --- diff --git a/maintenance/update.php b/maintenance/update.php index ba66c76683..70cea516ec 100755 --- a/maintenance/update.php +++ b/maintenance/update.php @@ -170,6 +170,24 @@ class UpdateMediaWiki extends Maintenance { $time1 = microtime( true ); + $badPhpUnit = dirname( __DIR__ ) . '/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php'; + if ( file_exists( $badPhpUnit ) ) { + // Bad versions of the file are: + // https://raw.githubusercontent.com/sebastianbergmann/phpunit/c820f915bfae34e5a836f94967a2a5ea5ef34f21/src/Util/PHP/eval-stdin.php + // https://raw.githubusercontent.com/sebastianbergmann/phpunit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412/src/Util/PHP/eval-stdin.php + $md5 = md5_file( $badPhpUnit ); + if ( $md5 === '120ac49800671dc383b6f3709c25c099' + || $md5 === '28af792cb38fc9a1b236b91c1aad2876' + ) { + $success = unlink( $badPhpUnit ); + if ( $success ) { + $this->output( "Removed PHPUnit eval-stdin.php to protect against CVE-2017-9841\n" ); + } else { + $this->error( "Unable to remove $badPhpUnit, you should manually. See CVE-2017-9841" ); + } + } + } + $shared = $this->hasOption( 'doshared' ); $updates = [ 'core', 'extensions' ];