DeluxeBB deluxe/posting.php templatefolder Variable Remote File Inclusion

2006-06-14T08:34:02
ID OSVDB:26459
Type osvdb
Reporter Andreas Sandblad(as@secunia.com)
Modified 2006-06-14T08:34:02

Description

Vulnerability Description

DeluxeBB contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the templates/deluxe/posting.php script not properly sanitizing user input supplied to the 'templatefolder' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

DeluxeBB contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the templates/deluxe/posting.php script not properly sanitizing user input supplied to the 'templatefolder' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/templates/deluxe/posting.php?templatefolder=[file]

References:

Vendor URL: http://www.deluxebb.com/ Secunia Advisory ID:20152 Related OSVDB ID: 26462 Related OSVDB ID: 26460 Related OSVDB ID: 26457 Related OSVDB ID: 26458 Related OSVDB ID: 26461 Related OSVDB ID: 26463 Other Advisory URL: http://secunia.com/secunia_research/2006-44/advisory/ Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0288.html CVE-2006-2914 Bugtraq ID: 18455