Simple Discussion Board blank.php Multiple Variable Remote File Inclusion

2006-09-19T10:33:56
ID OSVDB:29041
Type osvdb
Reporter CeNGiZ-HaN(cengiz-han@system-defacers.org)
Modified 2006-09-19T10:33:56

Description

Vulnerability Description

Simple Discussion Board contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to blank.php not properly sanitizing user input supplied to the env_dir and script_root variables. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Simple Discussion Board contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to blank.php not properly sanitizing user input supplied to the env_dir and script_root variables. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[path]/blank.php?env_dir=shell http://[target]/[path]/blank.php?script_root=shell

References:

Vendor URL: http://sourceforge.net/projects/sdb Secunia Advisory ID:21990 Related OSVDB ID: 29043 Related OSVDB ID: 29042 ISS X-Force ID: 29025 Generic Exploit URL: http://www.milw0rm.com/exploits/2396 CVE-2006-4918 Bugtraq ID: 20103