w-Agora http_user Arbitrary Command Execution

2004-10-19T15:48:14
ID OSVDB:11253
Type osvdb
Reporter OSVDB
Modified 2004-10-19T15:48:14

Description

Vulnerability Description

w-Agora contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the user/http_user facility not properly sanitizing user input. By supplying an arbitrary PHP file on a remote server, the system will execute the commands with the same privileges as the web server. This would only affect systems that do not use or properly implement an .htaccess file.

Solution Description

Upgrade to version 4.1.7 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

w-Agora contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the user/http_user facility not properly sanitizing user input. By supplying an arbitrary PHP file on a remote server, the system will execute the commands with the same privileges as the web server. This would only affect systems that do not use or properly implement an .htaccess file.

References:

Vendor URL: http://www.w-agora.net/ Vendor Specific News/Changelog Entry: http://www.w-agora.net/current/doc/ChangeLog Keyword: Remote File Inclusion