Ravens PHP Scripts

MxBB Portal mx_newssuite Module *mx_root_path* File Inclusion
Date: Wednesday, December 13, 2006 @ 09:04:55 CST
Topic: Security


SECUNIA ADVISORY ID: SA23358

VERIFY ADVISORY: http://secunia.com/advisories/23358/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: mx_newssuite (module for MxBB Portal) 1.x - http://secunia.com/product/12886/

DESCRIPTION: Dr Max Virus has discovered a vulnerability in the mx_newssuite module for MxBB Portal, which can be exploited by malicious people to compromise vulnerable systems.




Input passed to the "mx_root_path" parameter in includes/newssuite_constants.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that "register_globals" is enabled. The vulnerability is confirmed in version 1.03. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY: Dr Max Virus

ORIGINAL ADVISORY: http://www.milw0rm.com/exploits/2925






This article comes from Ravens PHP Scripts
https://www.ravenphpscripts.com

The URL for this story is:
https://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2560