SECUNIA ADVISORY ID: SA23477
VERIFY ADVISORY: http://secunia.com/advisories/23477/
CRITICAL: Highly critical
IMPACT: System access
SOFTWARE: KISGB 5.x - http://secunia.com/product/12955/
DESCRIPTION: mdx has reported a vulnerability in KISGB, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the "default_path_for_themes" parameter in authenticate.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that the CGI version of PHP is used.
SOLUTION: Edit the source code to ensure that input is properly verified.
PROVIDED AND/OR DISCOVERED BY: mdx
ORIGINAL ADVISORY: http://www.milw0rm.com/exploits/2979Note:
From Raven: I was not notified before this was released to the masses. I am in the process of testing my fixes and expect to release an update either today or tomorrow. It does not appear that the NUKE version is affected, although you should be sure that register_globals is set OFF.
KISGB *default_path_for_themes* File Inclusion VulnerabilityPosted on Tuesday, December 26, 2006 @ 16:06:54 CST in Security |