Ravens PHP Scripts

FreeWebShop.org *lang_file* File Inclusion Vulnerability
Date: Wednesday, January 24, 2007 @ 10:37:11 PST
Topic: Security


SECUNIA ADVISORY ID: SA23898

VERIFY ADVISORY: http://secunia.com/advisories/23898/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: FreeWebshop.org Script 2.x - http://secunia.com/product/12481/

DESCRIPTION: David Sopas Ferreira has reported a vulnerability in FreeWebShop.org, which can be exploited by malicious people to compromise a vulnerable system.


Input passed to the "lang_file" parameter in includes/login.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local and external resources. The vulnerability is reported in version 2.2.4. Other versions may also be affected.

SOLUTION: Delete the includes/login.php file or update to version 2.2.4 downloaded after 2007-01-23.

PROVIDED AND/OR DISCOVERED BY: David Sopas Ferreira a.k.a SmOk3

ORIGINAL ADVISORY: http://14house.blogspot.com/2007/01/freewebshoporg-remote-file-inclusion.html: http://www.freewebshop.org/?id=36






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2682