GrapAgenda index.php page Variable Remote File Inclusion

2006-09-05T05:33:49
ID OSVDB:28553
Type osvdb
Reporter Botan(botanlinuxmail.org)
Modified 2006-09-05T05:33:49

Description

Vulnerability Description

GrapAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to index.php not properly sanitizing user input supplied to the 'page' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

GrapAgenda contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to index.php not properly sanitizing user input supplied to the 'page' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[agendapath]/index.php?page=yourcode.txt?&cmd=id

References:

Vendor URL: http://www.graphiks.net/ Secunia Advisory ID:21775 Other Advisory URL: http://kurdishsecurity.blogspot.com/2006/09/kurdish-security-25-grapagenda-remote.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0037.html Keyword: Kurdish Security # 25 FrSIRT Advisory: ADV-2006-3469 CVE-2006-4610 Bugtraq ID: 19857