SQuery sof1.php libpath Variable Remote File Inclusion

2006-04-01T09:47:39
ID OSVDB:24425
Type osvdb
Reporter uid0(uid0@exploitercode.com)
Modified 2006-04-01T09:47:39

Description

Vulnerability Description

SQuery contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to sof1.php (not an underlying library) not properly sanitizing user input supplied to the 'libpath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

SQuery contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to sof1.php (not an underlying library) not properly sanitizing user input supplied to the 'libpath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

References:

Vendor URL: http://www.squery.com/ Secunia Advisory ID:19482 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0004.html Generic Exploit URL: http://milw0rm.com/exploits/1629 FrSIRT Advisory: ADV-2006-1284 CVE-2006-1688 Bugtraq ID: 17434