dadaIMC *FilesMatch* File Upload Vulnerability

Posted on Wednesday, December 13, 2006 @ 01:00:49 UTC in Security
by Raven



SECUNIA ADVISORY ID: SA23305

VERIFY ADVISORY: http://secunia.com/advisories/23305/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: dadaIMC 0.x - http://secunia.com/product/4139/

DESCRIPTION: Hagbard Celine has reported a vulnerability in dadaIMC, which can be exploited by malicious people to compromise vulnerable systems.
The file "[webroot]/.htaccess" contains a "FilesMatch" directive with a regular expression that configures the web server to treat all filenames containing the words "feature", "editor", "newswire", "otherpress", "admin", "pbook", "media" or "mod" as PHP scripts. Malicious people can upload files with such filenames by posting an article and attaching an image to it. Successful exploitation requires that dadaIMC is installed into a shared environment. The vulnerability is reported in version .99.3. Other versions may also be vulnerable.

SOLUTION: Configure "FilesMatch" in "[webroot]/.htaccess" with a more restrictive regular expression.

PROVIDED AND/OR DISCOVERED BY: Hagbard Celine

ORIGINAL ADVISORY: http://bugs.dadaimc.org/view.php?id=191

OTHER REFERENCES: http://www.dadaimc.org/mod/documentation/display/4/index.php
 
 
click Related        click Share
 
News ©

Site Info

Last SeenLast Seen
  • neralex
  • nextgen
Server TrafficServer Traffic
  • Total: 482,204,527
  • Today: 18,072
Server InfoServer Info
  • Apr 16, 2024
  • 06:14 pm UTC