SECUNIA ADVISORY ID: SA23305
VERIFY ADVISORY: http://secunia.com/advisories/23305/
CRITICAL: Highly critical
IMPACT: System access
SOFTWARE: dadaIMC 0.x - http://secunia.com/product/4139/
DESCRIPTION: Hagbard Celine has reported a vulnerability in dadaIMC, which can be exploited by malicious people to compromise vulnerable systems. The file "[webroot]/.htaccess" contains a "FilesMatch" directive with a regular expression that configures the web server to treat all filenames containing the words "feature", "editor", "newswire", "otherpress", "admin", "pbook", "media" or "mod" as PHP scripts. Malicious people can upload files with such filenames by posting an article and attaching an image to it. Successful exploitation requires that dadaIMC is installed into a shared environment. The vulnerability is reported in version .99.3. Other versions may also be vulnerable.
SOLUTION: Configure "FilesMatch" in "[webroot]/.htaccess" with a more restrictive regular expression.
PROVIDED AND/OR DISCOVERED BY: Hagbard Celine
ORIGINAL ADVISORY: http://bugs.dadaimc.org/view.php?id=191
OTHER REFERENCES: http://www.dadaimc.org/mod/documentation/display/4/index.php
dadaIMC *FilesMatch* File Upload VulnerabilityPosted on Wednesday, December 13, 2006 @ 00:00:49 CST in Security |