Advanced Login *root* File Inclusion Vulnerability

Posted on Friday, March 30, 2007 @ 11:10:28 PDT in Security
by Raven



CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: Advanced Login 0.x -

DESCRIPTION: Zeni Susanto has discovered a vulnerability in Advanced Login, which can be exploited by malicious people to compromise a vulnerable system.

Input passed to the "root" parameter in engine/db/profiledit.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that "register_globals" is enabled. The vulnerability is confirmed in version 0.76. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified. Fixed in version 0.9 Public Beta 2.

PROVIDED AND/OR DISCOVERED BY: Zeni Susanto a.k.a. Bithedz

click Related        click Share
News ©

Site Info v2.2.2

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 369,837,624
  • Today: 52,268
Server InfoServer Info
  • Oct 21, 2018
  • 02:45 pm PDT

Daily Inspiration