Date: Thu, 15 May 2003 01:43:40 +0800
From: Mind Warper <[email protected]>
To: [email protected]Subject: php-proxima Remote File Access Vulnerability
php-proxima Remote File Access Vulnerability
----------------------
Vendor Information:
----------------------
Homepage : http://www.php-proxima.com
Vendor : informed
Mailed advisory: 14/05/03
Vender Response : None
----------------------
Affected Versions:
----------------------
php-proxima 6.0 and prior
----------------------
Vulnerability:
----------------------
php-proxima is a website portal system made in php. php-proxima is actually
a different version of php-nuke, very similar although it has some changes.
One of the changes is that php-proxima contains a file called autohtml.php.
By sending a specific request as shown bellow an attacker may be able to
include local files and therefore read them.
The problem appears here:
***************************
..
witch($op) {
case "modload":
if (!isset($mainfile)) { include("mainfile.php"); }
$index = 0;
include("header.php");
OpenTable();
include("autohtml/$name");
..
***************************
Since the case has been coded so poorly in terms of security, a user
can avoid including mainfile.php and inject anything into $name.
Example:
http://victim/autohtml.php?op=modload&mainfile=x&name=<local filename>
----------------------
Solution:
----------------------
You can fix this problem by replacing
include("autohtml/$name");
with
// include("autohtml/$name");
Please check the vendor's website for new patches.
----------------------
Contact:
----------------------
Name: Mindwarper
Email: [email protected]
Website: http://mindlock.bestweb.net
--
______________________________________________
http://www.linuxmail.org/
Now with e-mail forwarding for only US$5.95/yr
Powered by Outblaze