ISPConfig Session.INC.PHP Remote File Include Vulnerability
BID:17909
CVE-2006-2315 |Info
ISPConfig Session.INC.PHP Remote File Include Vulnerability
| Bugtraq ID: | 17909 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | May 09 2006 12:00AM |
| Updated: | Jun 16 2006 07:21PM |
| Credit: | ReZEN is credited with the discovery of this vulnerability. |
| Vulnerable: |
ISPConfig ISPConfig 2.2.3 ISPConfig ISPConfig 2.2.2 |
| Not Vulnerable: | |
Discussion
ISPConfig Session.INC.PHP Remote File Include Vulnerability
ISPConfig is prone to a remote file-include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
This issue affects version 2.2.2; other versions may also be affected.
ISPConfig is prone to a remote file-include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
This issue affects version 2.2.2; other versions may also be affected.
Exploit / POC
ISPConfig Session.INC.PHP Remote File Include Vulnerability
This issue can be exploited through a web client.
An exploit is available as well as proof-of-concept URIs.
This issue can be exploited through a web client.
An exploit is available as well as proof-of-concept URIs.
Solution / Fix
ISPConfig Session.INC.PHP Remote File Include Vulnerability
Solution:
The vendor reports that this issue is not exploitable on default configurations of the application, because the vulnerable file is not in the web root. However, the vendor has released an advisory to address this issue for situations where the vulnerable file is accessible remotely. An update is pending. Please contact the vendor for more information.
Solution:
The vendor reports that this issue is not exploitable on default configurations of the application, because the vulnerable file is not in the web root. However, the vendor has released an advisory to address this issue for situations where the vulnerable file is accessible remotely. An update is pending. Please contact the vendor for more information.
References
ISPConfig Session.INC.PHP Remote File Include Vulnerability
References:
References:
- ISPConfig <= 2.2.2 - Remote Command Execution Vulnerability (ReZEN)
- ISPConfig Homepage (ISPConfig)
- [FSA016] ISPConfig 2.2.3, File inclusion vulnerability (Federico Fazzi)
- Re: [Bugtraq ID: 17909] ISPConfig Session.INC.PHP Remote File Include Vulnerabil ([email protected])
- Re: [FSA016] ISPConfig 2.2.3, File inclusion vulnerability ([email protected])