netVigilance Security Advisory #14
w-agora version 4.2.1 Multiple Path Disclosure Vulnerabilities
Description: w-agora is a set of scripts written in PHP. This package is intended to allow users to share, exchange and publish information, files and discussions over the web. Multiple path disclosure vulnerabilities allow the attacker to disclose the true path of the server-side scripts. Advisory URL: http://www.netvigilance.com/advisory0014
External References: Mitre CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0606 NVD NIST: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0606 OSVDB: 31668 http://www.osvdb.com/displayvuln.php?osvdb_id=31668 OSVDB: 31669 http://www.osvdb.com/displayvuln.php?osvdb_id=31669
Summary: w-agora is a set of scripts written in PHP intended to allow users to share, exchange and publish information, files and discussions over the web. Security issues in the product allow attackers to gather the true path of the server-side scripts. This vulnerabilities can be exploited only when PHP register_globals is On.
Release Date: March 19, 2007
Severity: Risk: Low
CVSS Metrics Access Vector: Remote Access Complexity: Low Authentication: not-required Confidentiality Impact: Partial Integrity Impact: None Availability Impact: None Impact Bias: Normal CVSS Base Score: 2.3
Target Distribution on Internet: Low
Exploitability: Functional Exploit Remediation Level: Workaround Report Confidence: Uncorroborated
Vulnerability Impact: Attack Host Impact: Path disclosure.
SecureScout Testcase ID: TC 17941
Vulnerable Systems: w-agora version 4.2.1
Vulnerability Type: Program flaw – The delete_forum.php and index.php scripts have flaws which lead to Warnings or even Fatal Errors. Vendor: Author Marc Druilhe.
Vendor Status: The Vendor has been notified on January 30th 2007, and has not responded. Workaround: Set PHP register_globals to Off. Disable warning messages: modify in the php.ini file following line: display_errors = Off. Or modify .htaccess file (this will work only for the apache servers).