Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:13423
HistoryJul 05, 2006 - 12:00 a.m.

[UNIX] Stud.IP File Inclusion

2006-07-0500:00:00
vulners.com
11

The following security advisory is sent to the securiteam mailing list, and can be found at the
SecuriTeam web site: http://www.securiteam.com

    • promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


Stud.IP File Inclusion

SUMMARY

" <http://www.studip.de/&gt; Stud.IP is a learning and an information
management system for universities, educational facilities and
enterprises."

Improper user validation allows attackers to execute arbitrary PHP code
using Stud.IP.

DETAILS

Vulnerable Systems:

  • studip version 1.3.0-2 and prior

Input passed to the "_PHPLIB[libdir]" parameter in
studip-phplib/oohforms.inc and to the "ABSOLUTE_PATH_STUDIP" parameter in
studip-htdocs/archiv_assi.php is not properly verified before being used
to include files.
This can be exploited to execute arbitrary PHP code by including files
from local or external resources.

Vulnerable Code :
[path]/studip-1.3.0-2/studip-phplib/oohforms.inc
//Vulnerable Code :line 378
include($_PHPLIB["libdir"] . "of_text.inc");
include($_PHPLIB["libdir"] . "of_select.inc");
include($_PHPLIB["libdir"] . "of_radio.inc");
include($_PHPLIB["libdir"] . "of_checkbox.inc");
include($_PHPLIB["libdir"] . "of_textarea.inc");
include($_PHPLIB["libdir"] . "of_file.inc");

Vulnerable Code :
[path]/studip-1.3.0-2/studip-htdocs/archiv_assi.php
//Vulnerable Code :line 22
require_once($ABSOLUTE_PATH_STUDIP . "dates.inc.php");
// Funktionen zum Loeschen von Terminen
require_once($ABSOLUTE_PATH_STUDIP . "datei.inc.php");
// Funktionen zum Loeschen von Dokumenten

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to:
[email protected]
In order to subscribe to the mailing list, simply forward this email to:
[email protected]

====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages.