PictureDis Products thumstbl.php lang Variable Remote File Inclusion

2006-06-15T04:34:06
ID OSVDB:26500
Type osvdb
Reporter supermalhacao()
Modified 2006-06-15T04:34:06

Description

Vulnerability Description

PictureDis contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to thumstbl.php not properly sanitizing user input supplied to the 'lang' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

It has been reported that this vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PictureDis contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to thumstbl.php not properly sanitizing user input supplied to the 'lang' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

/thumstbl.php?lang=[ur phpshell ]

References:

Vendor URL: http://www.picturedis.org/ Security Tracker: 1016279 Secunia Advisory ID:20656 Related OSVDB ID: 26501 Related OSVDB ID: 26502 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0336.html ISS X-Force ID: 27183 FrSIRT Advisory: ADV-2006-2352 CVE-2006-3075 Bugtraq ID: 18471