Flog config.php FLog_dir_include Variable Remote File Inclusion

2006-06-13T16:32:16
ID OSVDB:27675
Type osvdb
Reporter SpC-x(spc-x@bsdmail.org)
Modified 2006-06-13T16:32:16

Description

Vulnerability Description

Flog has been reported to contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is supposedly due to the config.php script not properly sanitizing user input supplied to the 'FLog_dir_include' variable. However, subsequent evaluation indicates the variable is set to a static value in the core.inc.php file and can not be manipulated by an attacker.

Solution Description

The vulnerability reported is incorrect. No solution required.

Short Description

Flog has been reported to contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is supposedly due to the config.php script not properly sanitizing user input supplied to the 'FLog_dir_include' variable. However, subsequent evaluation indicates the variable is set to a static value in the core.inc.php file and can not be manipulated by an attacker.

Manual Testing Notes

http://[target]/Flog/config.php?FLog_dir_include=Command-Shell

References:

Vendor URL: http://fluffington.com/ Other Advisory URL: http://www.root-security.org/danger/Flog.txt Other Advisory URL: http://www.security.nnov.ru/Ndocument123.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0242.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0267.html