Ravens PHP Scripts

phpMyReports *cfgPathModule* File Inclusion Vulnerability
Date: Monday, January 29, 2007 @ 11:57:41 CET
Topic: Security


SECUNIA ADVISORY ID: SA23959

VERIFY ADVISORY: http://secunia.com/advisories/23959/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: phpMyReports 3.x - http://secunia.com/product/13374/

DESCRIPTION: GolD_M has discovered a vulnerability in phpMyReports, which can be exploited by malicious people to compromise vulnerable systems.


Input passed to the "cfgPathModule" parameter in include/lib/lib_head.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that "register_globals" is enabled. The vulnerability is confirmed in version 3.0.11. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY: GolD_M

ORIGINAL ADVISORY: http://milw0rm.com/exploits/3212






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2703