KISGB *default_path_for_themes* File Inclusion Vulnerability

Posted on Tuesday, December 26, 2006 @ 16:06:54 CST in Security
by Raven

SECUNIA ADVISORY ID: SA23477

VERIFY ADVISORY: http://secunia.com/advisories/23477/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: KISGB 5.x - http://secunia.com/product/12955/

DESCRIPTION: mdx has reported a vulnerability in KISGB, which can be exploited by malicious people to compromise a vulnerable system.
Input passed to the "default_path_for_themes" parameter in authenticate.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that the CGI version of PHP is used.

SOLUTION: Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY: mdx

ORIGINAL ADVISORY: http://www.milw0rm.com/exploits/2979
Note:
From Raven: I was not notified before this was released to the masses. I am in the process of testing my fixes and expect to release an update either today or tomorrow. It does not appear that the NUKE version is affected, although you should be sure that register_globals is set OFF.
 
 
click Related        click Share
 
 
Associated Topics

Guest Book
 
News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,129,415
  • Today: 195,610
Server InfoServer Info
  • Apr 23, 2025
  • 05:39 pm CDT