w-agora version 4.2.1 Multiple Path Disclosure Vulnerabilities

2007.03.23
Risk: Low
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

netVigilance Security Advisory #14 w-agora version 4.2.1 Multiple Path Disclosure Vulnerabilities Description: w-agora is a set of scripts written in PHP. This package is intended to allow users to share, exchange and publish information, files and discussions over the web. Multiple path disclosure vulnerabilities allow the attacker to disclose the true path of the server-side scripts. Advisory URL: http://www.netvigilance.com/advisory0014 External References: Mitre CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0606 NVD NIST: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0606 OSVDB: 31668 http://www.osvdb.com/displayvuln.php?osvdb_id=31668 OSVDB: 31669 http://www.osvdb.com/displayvuln.php?osvdb_id=31669 Summary: w-agora is a set of scripts written in PHP intended to allow users to share, exchange and publish information, files and discussions over the web. Security issues in the product allow attackers to gather the true path of the server-side scripts. This vulnerabilities can be exploited only when PHP register_globals is On. Release Date: March 19, 2007 Severity: Risk: Low CVSS Metrics Access Vector: Remote Access Complexity: Low Authentication: not-required Confidentiality Impact: Partial Integrity Impact: None Availability Impact: None Impact Bias: Normal CVSS Base Score: 2.3 Target Distribution on Internet: Low Exploitability: Functional Exploit Remediation Level: Workaround Report Confidence: Uncorroborated Vulnerability Impact: Attack Host Impact: Path disclosure. SecureScout Testcase ID: TC 17941 Vulnerable Systems: w-agora version 4.2.1 Vulnerability Type: Program flaw ? The delete_forum.php and index.php scripts have flaws which lead to Warnings or even Fatal Errors. Vendor: Author Marc Druilhe. Vendor Status: The Vendor has been notified on January 30th 2007, and has not responded. Workaround: Set PHP register_globals to Off. Disable warning messages: modify in the php.ini file following line: display_errors = Off. Or modify .htaccess file (this will work only for the apache servers). Example: Path Disclosure Vulnerability 1: REQUEST http://[TARGET]/[w-agora-directory]/index.php?bn[]=1 REPLY <!--error--><br /> <b>Warning</b>: basename() expects parameter 1 to be string, array given in <b> http://[TARGET]/[w-agora-directory]index.php</b> on line <b>29</b><br /> <script language=JavaScript src='/errors__/phperror_js.php'></script>ERROR_NO_CONFIG_FILEconf/site_a gora.php Path Disclosure Vulnerability 2: http://[TARGET]/[w-agora-directory]/delete_forum.php?remove_site=1&cfg_d ir=1&bn=1&ext=1&bn=&site_cfg_file=1 REPLY <!--error--><br /> <b>Fatal error</b>: Call to undefined function: msgform() in <b> http://[TARGET]/[w-agora-directory]delete_forum.php</b> on line <b>22</b><br /> <script language=JavaScript src='/errors__/phperror_js.php'></script> Credits: Jesper Jurcenoks Co-founder netVigilance, Inc www.netvigilance.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top