Jinzora include_path Variable Remote File Inclusion

2005-06-30T00:00:00
ID OSVDB:17736
Type osvdb
Reporter OSVDB
Modified 2005-06-30T00:00:00

Description

Vulnerability Description

Jinzora contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include_path variable not properly sanitizing user input. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Upgrade to version 2.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Jinzora contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include_path variable not properly sanitizing user input. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

References:

Vendor URL: http://www.jinzora.org/ Secunia Advisory ID:15952 Mail List Post: http://archives.neohapsis.com/archives/apps/freshmeat/2005-07/0001.html CVE-2005-2249