Update : DreamAccount <= 3.1 - Remote File Include Vulnerability

Risk: High
Local: No
Remote: Yes
CWE: CWE-Other

CVSS Base Score: 5.1/10
Impact Subscore: 6.4/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Please update my advisory. After posting up my advisory I have seen that 2 other php-files are also affected by this vulnerability. Input passed to the "da_path" parameter in "auth.cookie.inc.php", "auth.header.inc.php" and "auth.sessions.inc.php" is not properly verified, before it is used to include files. This can be exploited to execute arbitrary code by including files from external resources. You can see the updated advisory here: http://majorsecurity.de/advisory/major_rls8.txt Greetings, David Vieira-Kurz

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023, cxsecurity.com


Back to Top