MySQL Commander *home* File Inclusion Vulnerability

Posted on Wednesday, March 14, 2007 @ 08:05:44 PDT in Security
by Raven

SECUNIA ADVISORY ID: SA24500

VERIFY ADVISORY: http://secunia.com/advisories/24500/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: MySQL Commander 2.x - http://secunia.com/product/13647/

DESCRIPTION: M.Hasran Addahroni has discovered a vulnerability in MySQL Commander, which can be exploited by malicious people to compromise a vulnerable system.

Input passed to the "home" parameter in ressourcen/dbopen.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that "register_globals" is enabled. The vulnerability is confirmed in version 2.7. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY: M.Hasran Addahroni

ORIGINAL ADVISORY: http://advisories.echo.or.id/adv/adv73-K-159-2007.txt
 
 
click Related        click Share
 
News ©

Site Info v2.2.2

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 346,247,052
  • Today: 30,363
Server InfoServer Info
  • Jan 19, 2018
  • 03:33 pm PST
 
 

Daily Inspiration