Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12058
HistoryMar 31, 2006 - 12:00 a.m.

[SA19453] v-creator VCEngine.php Shell Command Injection Vulnerability

2006-03-3100:00:00
vulners.com
6

TITLE:
v-creator VCEngine.php Shell Command Injection Vulnerability

SECUNIA ADVISORY ID:
SA19453

VERIFY ADVISORY:
http://secunia.com/advisories/19453/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
>From remote

SOFTWARE:
v-creator 1.x
http://secunia.com/product/9080/

DESCRIPTION:
A vulnerability has been reported in v-creator, which can be
exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an input validation error in the
"enrypt()" and "decrypt()" functions in VCEngine.php. This can be
exploited to inject arbitrary shell commands by supplying specially
crafted encryption strings via a script using the affected
functionality.

Successful exploitation requires that the configuration option
"VC_CRYPTO_METHOD" is set to "OPENSSL".

SOLUTION:
The vulnerability has been fixed in version 1.3-pre3.

PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.