Redaction System sesscheck.php lang_prefix Variable Remote File Inclusion

2006-10-12T05:03:55
ID OSVDB:29702
Type osvdb
Reporter r0ut3r(writ3r@gmail.com)
Modified 2006-10-12T05:03:55

Description

Vulnerability Description

Redaction System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to sesscheck.php not properly sanitizing user input supplied to the 'lang_prefix' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Upgrade to version 1.0001 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Redaction System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to sesscheck.php not properly sanitizing user input supplied to the 'lang_prefix' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

References:

Vendor URL: http://sourceforge.net/projects/redactionsystem/ Vendor Specific News/Changelog Entry: http://redactionsystem.sourceforge.net/index.php?m=news&id=5 Vendor Specific News/Changelog Entry: http://www.securityfocus.com/bid/http://redactionsystem.sourceforge.net/index.php?m=news&id=2 Secunia Advisory ID:22347 Related OSVDB ID: 29700 Related OSVDB ID: 29703 Related OSVDB ID: 29704 Related OSVDB ID: 29701 ISS X-Force ID: 29504 Generic Exploit URL: http://milw0rm.com/exploits/2534 FrSIRT Advisory: ADV-2006-4024 CVE-2006-5302 Bugtraq ID: 20499