Loudblog backend_settings.php GLOBALS[path] Variable Remote File Inclusion

2006-02-03T04:18:26
ID OSVDB:22921
Type osvdb
Reporter rgod(retrogod@aliceposta.it)
Modified 2006-02-03T04:18:26

Description

Vulnerability Description

Loudblog contains a flaw that may allow an attacker to carry out a remote file inclusion attack. The issue is due to the "loudblog/inc/backend_settings.php" script not properly sanitizing user-supplied input to the "path" variable. This may allow a remote attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Loudblog contains a flaw that may allow an attacker to carry out a remote file inclusion attack. The issue is due to the "loudblog/inc/backend_settings.php" script not properly sanitizing user-supplied input to the "path" variable. This may allow a remote attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

References:

Vendor URL: http://loudblog.de/ Security Tracker: 1015583 Secunia Advisory ID:18722 Other Advisory URL: http://retrogod.altervista.org/loudblog_04_incl_xpl.html Nessus Plugin ID:20861 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-02/0053.html ISS X-Force ID: 24479 FrSIRT Advisory: ADV-2006-0441 CVE-2006-0565 Bugtraq ID: 16495