communityPortals includes/import-archive.php cp_root_path Variable Remote File Inclusion

2006-10-12T04:48:58
ID OSVDB:29670
Type osvdb
Reporter Ashiyane Corporation()
Modified 2006-10-12T04:48:58

Description

Vulnerability Description

Leicestershire Community Portals contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to includes/import-archive.php not properly sanitizing user input supplied to the "cp_root_path" variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s):

Ensure "register_globals" is set to 'Off' in the web server PHP configuration.

Short Description

Leicestershire Community Portals contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to includes/import-archive.php not properly sanitizing user input supplied to the "cp_root_path" variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

References:

Vendor URL: http://www.leicestershirecommunity.com/ Secunia Advisory ID:22381 FrSIRT Advisory: 2006-4010 CVE-2006-5280 Bugtraq ID: 20479