Korean
<< Back
VID 210015
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The e107 Website System is vulnerable to a local file include vulnerability via the 'e_LANGUAGE' cookie variable. e107 is a freely available, Web content management system written in PHP. e107 version 0.7.5 and earlier versions are vulnerable to a local file include vulnerability through the 'e_LANGUAGE' cookie variable, which is used in PHP 'include_once()' functions. By sending a specially-crafted URL request to the gsitemap.php script using the e107language_e107cookie cookie containing "dot dot" sequences (/../) with a local file, regardless of PHP's settings, a remote attacker could view arbitrary files or execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.

* References:
http://secunia.com/advisories/20727/
http://milw0rm.com/exploits/2711

* Platforms Affected:
e107 version 0.7.5 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of e107 (0.7.6 or later), available from the e107 Web page at http://e107.org/
Related URL CVE-2006-5786 (CVE)
Related URL 20913 (SecurityFocus)
Related URL 30030 (ISS)