Virtual War (Vwar) admin.php vwar_root Variable Remote File Inclusion

2006-04-22T05:38:03
ID OSVDB:25301
Type osvdb
Reporter S3rv3r_hack3r(ali@hackerz.ir)
Modified 2006-04-22T05:38:03

Description

Vulnerability Description

VWar contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to 'admin.php' not properly sanitizing user input supplied to the 'vwar_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Upgrade to version 1.5.0 R13 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

VWar contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to 'admin.php' not properly sanitizing user input supplied to the 'vwar_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

References:

Vendor URL: http://www.vwar.de/ Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0460.html