SECUNIA ADVISORY ID: SA24484
VERIFY ADVISORY: http://secunia.com/advisories/24484/
CRITICAL: Moderately critical
IMPACT: Exposure of system information, Exposure of sensitive information
WHERE: >From remote
SOFTWARE:
PHP-Nuke 7.x - http://secunia.com/product/2385/
PHP-Nuke 8.x - http://secunia.com/product/13524/
DESCRIPTION: Aleksandar has discovered a vulnerability in PHP-Nuke, which can be exploited by malicious people to disclose sensitive information.
Input passed in the "lang" cookie to index.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources. Successful exploitation requires that the system is running PHP 5 and that "magic_quotes_gpc" is disabled.
The vulnerability is confirmed in version 7.9 and reported in version 8.0. Other versions may also be affected.
SOLUTION:
Edit the source code to ensure that input is properly verified.
Set "magic_quotes_gpc" to On.
Use another product.
PROVIDED AND/OR DISCOVERED BY: Aleksandar a.k.a. sale83
Re: PHP-Nuke *lang* Local File Inclusion Vulnerability (Score: 1) | ![]() | } elseif (isset($lang)) { > if (eregi('[A-Za-z]', $lang)) { > if (file_exists("language/lang-".$lang.".php")) { > include_once("language/lang-".$lang.".php"); > $currentlang = $lang; > }else { > include_once("language/lang-english.php"); > $currentlang = "english"; > } > }else { > include_once("language/lang-english.php"); > $currentlang = "english"; > } > } else { |
Re: PHP-Nuke *lang* Local File Inclusion Vulnerability (Score: 1) | ![]() | Note that the latest RavenNuke and Patched 7.8 and lower should not be affected. Patched 7.9 and 8.0 may be affected, I will talk to chatserv about this Feel free to post any comments or questions on what to do http://evaders.swrebellion.com/forums/postp325.html#325 [evaders.swrebellion.com] |
Re: PHP-Nuke *lang* Local File Inclusion Vulnerability (Score: 1) | ![]() | I looked at 7.9 with the 3.2 patches, and I'm slightly confused. If an attacker managed to get a file onto your server in the language folder, then they could execute it, right? What else am I missing? |
Re: PHP-Nuke *lang* Local File Inclusion Vulnerability (Score: 1) | ![]() | In 7.9 / 8.0, the $lang variable is not properly filtered. So its possible to include other files that you may not want to disclose.. .htaccess, etc |
Re: PHP-Nuke *lang* Local File Inclusion Vulnerability (Score: 1) by Gremmie on Tuesday, March 13, 2007 @ 18:55:24 CDT (User Info | Send a Message) | |
So one needs to filter out "..", for example? |
Re: PHP-Nuke *lang* Local File Inclusion Vulnerability (Score: 1) by evaders99 on Tuesday, March 13, 2007 @ 23:33:50 CDT (User Info | Send a Message) http://www.swrebellion.com | |
Right. Patched 7.8 and lower do a stristr check for . Patched 7.9/8.0 seems to have an older code |