SoftNews Media Group DataLife Engine Multiple Remote File Include Vulnerabilities
BID:22913
Info
SoftNews Media Group DataLife Engine Multiple Remote File Include Vulnerabilities
| Bugtraq ID: | 22913 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1424 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 10 2007 12:00AM |
| Updated: | May 07 2015 06:01PM |
| Credit: | Hasadya Raed is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Softnews Media Group DataLife Engine 5.5 Softnews Media Group DataLife Engine 4.1 |
| Not Vulnerable: | |
Discussion
SoftNews Media Group DataLife Engine Multiple Remote File Include Vulnerabilities
DataLife Engine is prone to multiple remote file-include vulnerabilities.
An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
NOTE: Further information reveals that the reported vulnerable parameter is actually a constant, not a variable, so it cannot be controlled by an attacker. Since the application is not vulnerable, this BID is being retired.
DataLife Engine is prone to multiple remote file-include vulnerabilities.
An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
NOTE: Further information reveals that the reported vulnerable parameter is actually a constant, not a variable, so it cannot be controlled by an attacker. Since the application is not vulnerable, this BID is being retired.
Exploit / POC
SoftNews Media Group DataLife Engine Multiple Remote File Include Vulnerabilities
Attackers can use a browser to exploit these issues.
The following proof-of-concept URIs are available:
http://www.example.com/engine/init.php?root_dir=[Shell-Attack]
http://www.example.com/engine/Ajax/editnews.php?root_dir=[Shell-Attack]k]
Attackers can use a browser to exploit these issues.
The following proof-of-concept URIs are available:
http://www.example.com/engine/init.php?root_dir=[Shell-Attack]
http://www.example.com/engine/Ajax/editnews.php?root_dir=[Shell-Attack]k]
Solution / Fix
SoftNews Media Group DataLife Engine Multiple Remote File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
SoftNews Media Group DataLife Engine Multiple Remote File Include Vulnerabilities
References:
References:
- DataLife Engine Homepage (Softnews Media Group)
- Re: Remote File Include In Script SoftNews Media Group ([email protected])
- Remote File Include In Script SoftNews Media Group (Hasadya Raed)