RETIRED: Active PHP Bookmarks APB_SETTINGS['apb_path'] Multiple Remote File Include Vulnerabilities
BID:21263
Info
RETIRED: Active PHP Bookmarks APB_SETTINGS['apb_path'] Multiple Remote File Include Vulnerabilities
| Bugtraq ID: | 21263 |
| Class: | Input Validation Error |
| CVE: |
CVE-2006-6167 |
| Remote: | Yes |
| Local: | No |
| Published: | Nov 23 2006 12:00AM |
| Updated: | May 12 2015 07:49PM |
| Credit: | ThE-LoRd-Of-CrAcKiNg is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
lbstone Active PHP Bookmarks 1.1.2 |
| Not Vulnerable: | |
Discussion
RETIRED: Active PHP Bookmarks APB_SETTINGS['apb_path'] Multiple Remote File Include Vulnerabilities
Active PHP Bookmarks application is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Version 1.1.02 is vulnerable to this issue; other versions may also be affected.
This BID is being retired because further analysis reveals that the application is not vulnerable.
Active PHP Bookmarks application is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Version 1.1.02 is vulnerable to this issue; other versions may also be affected.
This BID is being retired because further analysis reveals that the application is not vulnerable.
Exploit / POC
RETIRED: Active PHP Bookmarks APB_SETTINGS['apb_path'] Multiple Remote File Include Vulnerabilities
An attacker can exploit these issues via a web client.
The following proof-of-concept URIs and exploit code are available:
http://www.example.com/[Script_Path]/apb_common.php?APB_SETTINGS['apb_path']=Shell.txt?
http://www.example.com/[Script_Path]/apb.php?APB_SETTINGS['apb_path']=Shell.txt?
An attacker can exploit these issues via a web client.
The following proof-of-concept URIs and exploit code are available:
http://www.example.com/[Script_Path]/apb_common.php?APB_SETTINGS['apb_path']=Shell.txt?
http://www.example.com/[Script_Path]/apb.php?APB_SETTINGS['apb_path']=Shell.txt?
Solution / Fix
RETIRED: Active PHP Bookmarks APB_SETTINGS['apb_path'] Multiple Remote File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
This BID is being retired because further analysis reveals that the application is not vulnerable.
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
This BID is being retired because further analysis reveals that the application is not vulnerable.
References
RETIRED: Active PHP Bookmarks APB_SETTINGS['apb_path'] Multiple Remote File Include Vulnerabilities
References:
References: