Ravens PHP Scripts

dadaIMC *FilesMatch* File Upload Vulnerability
Date: Wednesday, December 13, 2006 @ 00:00:49 CST
Topic: Security




SECUNIA ADVISORY ID: SA23305

VERIFY ADVISORY: http://secunia.com/advisories/23305/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: dadaIMC 0.x - http://secunia.com/product/4139/

DESCRIPTION: Hagbard Celine has reported a vulnerability in dadaIMC, which can be exploited by malicious people to compromise vulnerable systems.


The file "[webroot]/.htaccess" contains a "FilesMatch" directive with a regular expression that configures the web server to treat all filenames containing the words "feature", "editor", "newswire", "otherpress", "admin", "pbook", "media" or "mod" as PHP scripts. Malicious people can upload files with such filenames by posting an article and attaching an image to it. Successful exploitation requires that dadaIMC is installed into a shared environment. The vulnerability is reported in version .99.3. Other versions may also be vulnerable.

SOLUTION: Configure "FilesMatch" in "[webroot]/.htaccess" with a more restrictive regular expression.

PROVIDED AND/OR DISCOVERED BY: Hagbard Celine

ORIGINAL ADVISORY: http://bugs.dadaimc.org/view.php?id=191

OTHER REFERENCES: http://www.dadaimc.org/mod/documentation/display/4/index.php






This article comes from Ravens PHP Scripts
https://www.ravenphpscripts.com

The URL for this story is:
https://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2559