Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   HostAdmin Vendors:   Dreamcost LLC
HostAdmin 'path' Parameter Include File Bug Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1016273
SecurityTracker URL:
CVE Reference:   CVE-2006-0791   (Links to External Site)
Date:  Jun 13 2006
Impact:   Execution of arbitrary code via network, User access via network

Version(s): 3.1 and prior versions
Description:   David 'Aesthetico' Vieira-Kurz of MajorSecurity discovered a vulnerability in HostAdmin. A remote user can include and execute arbitrary code on the target system.

The 'index.php', 'functions.php', and 'members.php' scripts do not properly validate user-supplied input in the 'path' parameter. If register_globals is enabled, a remote user can supply a specially crafted URL to cause the target system to include and execute arbitrary PHP code from a remote location. The PHP code, including operating system commands, will run with the privileges of the target web service.

The original advisory is available at:

[Editor's note: The vulnerability in 'index.php' was previously reported by ReZEN from XOR Crew in February 2006.]

Impact:   A remote user can execute arbitrary PHP code and operating system commands on the target system with the privileges of the target web service.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  [MajorSecurity #9]HostAdmin <= 3.1 - Remote File Include

[MajorSecurity #9]HostAdmin <= 3.1 - Remote File Include Vulnerability

Software: HostAdmin

Version: <=3.1

Type: Remote File Include Vulnerability

Date: June, 3rd 2006

Vendor: dreamcost  


Risc: High


Discovered by: David 'Aesthetico' Vieira-Kurz

Original Advisory:

Affected Products:

HostAdmin 3.1 and prior


HostAdmin is designed to automate your entire account and order management, recurring billing,
domain registration, server provisioning, and reporting needs. From creating the member account,
logging the member in, displaying available hosting and domain registration options, 
providing a shopping cart and ordering mechanism for the available products, and creating the order record,
HostAdmin will handle your requirements with speed and ease.


register_globals = On


Input passed to the "path" parameter in "index.php", "functions.php" and "members.php" is not
properly verified, before it is used to include files.
This can be exploited to execute arbitrary code by including files from external resources.


I think you can fix this bug by replacing the following vulnerable code in the 
this 3 php-files with my one. It should fix the vulnerabilty and solve this

Vulnerable one:   "include($path . "member_template.html");"
MajorSecurity fix: "include("member_template.html");"

Set "register_globals" to "Off".


Post data:



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC