Advanced Login *root* File Inclusion Vulnerability

Posted on Friday, March 30, 2007 @ 12:10:28 PDT in Security
by Raven

SECUNIA ADVISORY ID: SA24695

VERIFY ADVISORY: http://secunia.com/advisories/24695/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: Advanced Login 0.x - http://secunia.com/product/13824/

DESCRIPTION: Zeni Susanto has discovered a vulnerability in Advanced Login, which can be exploited by malicious people to compromise a vulnerable system.


Input passed to the "root" parameter in engine/db/profiledit.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that "register_globals" is enabled. The vulnerability is confirmed in version 0.76. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified. Fixed in version 0.9 Public Beta 2.

PROVIDED AND/OR DISCOVERED BY: Zeni Susanto a.k.a. Bithedz

ORIGINAL ADVISORY: http://milw0rm.com/exploits/3608
 
 
click Related        click Share
 
News ©

Site Info v2.2.2

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 346,375,560
  • Today: 30,564
Server InfoServer Info
  • Jan 22, 2018
  • 02:35 pm PST
 
 

Daily Inspiration