Ottoman format_css.php default_path Variable Remote File Inclusion

2006-05-31T05:35:07
ID OSVDB:25919
Type osvdb
Reporter Kacper(kacper1964@yahoo.pl)
Modified 2006-05-31T05:35:07

Description

Vulnerability Description

Ottoman contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to format_css.php not properly sanitizing user input supplied to the 'default_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Upgrade to version 1.1.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Ottoman contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to format_css.php not properly sanitizing user input supplied to the 'default_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

References:

Vendor URL: http://www.lowter.com/p/ottoman/ Vendor Specific Solution URL: http://www.lowter.com/forums/viewtopic.php?id=964 Secunia Advisory ID:20399 Related OSVDB ID: 25917 Related OSVDB ID: 25916 Related OSVDB ID: 25920 Related OSVDB ID: 25921 Related OSVDB ID: 25918 Generic Exploit URL: http://www.devilteam.yum.pl/exploity/Exploits/20.html FrSIRT Advisory: ADV-2006-2073 Bugtraq ID: 18208