Advanced Login *root* File Inclusion Vulnerability

Posted on Friday, March 30, 2007 @ 11:10:28 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA24695

VERIFY ADVISORY: http://secunia.com/advisories/24695/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: Advanced Login 0.x - http://secunia.com/product/13824/

DESCRIPTION: Zeni Susanto has discovered a vulnerability in Advanced Login, which can be exploited by malicious people to compromise a vulnerable system.


Input passed to the "root" parameter in engine/db/profiledit.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that "register_globals" is enabled. The vulnerability is confirmed in version 0.76. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified. Fixed in version 0.9 Public Beta 2.

PROVIDED AND/OR DISCOVERED BY: Zeni Susanto a.k.a. Bithedz

ORIGINAL ADVISORY: http://milw0rm.com/exploits/3608
 
 
click Related        click Share
 
News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,705,938
  • Today: 41,127
Server InfoServer Info
  • Apr 27, 2025
  • 11:31 am CDT