Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   DreamAccount Vendors:   Dreamcost LLC
DreamAccount Include File Bug in '' Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1016272
SecurityTracker URL:
CVE Reference:   CVE-2006-2881   (Links to External Site)
Date:  Jun 13 2006
Impact:   Execution of arbitrary code via network, User access via network

Version(s): 3.1 and prior versions
Description:   David 'Aesthetico' Vieira-Kurz of MajorSecurity discovered a vulnerability in DreamAccount. A remote user can include and execute arbitrary code on the target system.

The '' script does not properly validate user-supplied input in the 'da_path' parameter. If register_globals is enabled, a remote user can supply a specially crafted URL to cause the target system to include and execute arbitrary PHP code from a remote location. The PHP code, including operating system commands, will run with the privileges of the target web service.

The '' and '' scripts are also affected.

The original advisory is available at:

Impact:   A remote user can execute arbitrary PHP code and operating system commands on the target system with the privileges of the target web service.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  [MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include

[MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include Vulnerability

Software: DreamAccount

Version: <=3.1

Type: Remote File Include Vulnerability

Date: June, 3rd 2006

Vendor: dreamcost  


Risc: High


Discovered by: David 'Aesthetico' Vieira-Kurz

Original Advisory:

Affected Products:

DreamAccount 3.1 and prior


DreamAccount is a membership and subscription software application that is both simple to use and install, 
while remaining affordable enough for even the smallest startup.


register_globals = On


Input passed to the "da_path" parameter in "" is not
properly verified, before it is used to include files.
This can be exploited to execute arbitrary code by including files from external resources.


I think you can fix this bug by replacing the following vulnerable code in the 
"" with my one. It should fix the vulnerabilty and solve this

Vulnerable one:   "require($da_path . "setup.php");"
MajorSecurity fix: "require("setup.php");"

Set "register_globals" to "Off".


Post data:



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC