TagIt! Tagboard index.php page Variable Remote File Inclusion

2006-09-29T13:03:52
ID OSVDB:29293
Type osvdb
Reporter Kernel-32(kernel-32@linuxmail.org)
Modified 2006-09-29T13:03:52

Description

Vulnerability Description

TagIt! Tagboard contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to index.php not properly sanitizing user input supplied to the 'page' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

TagIt! Tagboard contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to index.php not properly sanitizing user input supplied to the 'page' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/path/index.php?page=shell

References:

Vendor URL: http://codewalkers.com/seecode/453.html Secunia Advisory ID:22189 Related OSVDB ID: 29293 ISS X-Force ID: 29257 Generic Informational URL: http://kernel-32.blogspot.com/2006/09/tagmin-cc-21b-remote-file-include.html Generic Exploit URL: http://milw0rm.com/exploits/2450 FrSIRT Advisory: ADV-2006-3850 CVE-2006-5093 Bugtraq ID: 20260