Ravens PHP Scripts

phpBB Mail2Forum Module m2f_root_path File Inclusion
Date: Tuesday, July 18, 2006 @ 11:17:02 CDT
Topic: Security


TITLE: phpBB Mail2Forum Module "m2f_root_path" File Inclusion

SECUNIA ADVISORY ID: SA21083

VERIFY ADVISORY: http://secunia.com/advisories/21083/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: Mail2Forum 1.x (module for phpBB)
http://secunia.com/product/11080/

DESCRIPTION: OLiBekaS has reported a vulnerability in the Mail2Forum module for phpBB, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the "m2f_root_path" parameter in m2f/m2f_phpbb204.php, m2f/m2f_forum.php, m2f/m2f_mailinglist.php, and m2f/m2f_cron.php is not properly verified before being used to include files. This can be exploited to execute arbitrary PHP code by including files from local or external resources.

Successful exploitation requires that "register_globals" is enabled.

The vulnerability has been reported in version 1.2. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY: OLiBekaS

ORIGINAL ADVISORY: http://milw0rm.com/exploits/2019








This article comes from Ravens PHP Scripts
https://www.ravenphpscripts.com

The URL for this story is:
https://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2261