FreeWebShop.org *lang_file* File Inclusion Vulnerability

Posted on Wednesday, January 24, 2007 @ 11:37:11 CET in Security
by Raven

SECUNIA ADVISORY ID: SA23898

VERIFY ADVISORY: http://secunia.com/advisories/23898/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: FreeWebshop.org Script 2.x - http://secunia.com/product/12481/

DESCRIPTION: David Sopas Ferreira has reported a vulnerability in FreeWebShop.org, which can be exploited by malicious people to compromise a vulnerable system.
Input passed to the "lang_file" parameter in includes/login.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local and external resources. The vulnerability is reported in version 2.2.4. Other versions may also be affected.

SOLUTION: Delete the includes/login.php file or update to version 2.2.4 downloaded after 2007-01-23.

PROVIDED AND/OR DISCOVERED BY: David Sopas Ferreira a.k.a SmOk3

ORIGINAL ADVISORY: http://14house.blogspot.com/2007/01/freewebshoporg-remote-file-inclusion.html: http://www.freewebshop.org/?id=36
 
 
click Related        click Share
 
News ©

Site Info v2.2.2

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 372,918,719
  • Today: 66,058
Server InfoServer Info
  • Dec 09, 2018
  • 10:39 pm CET