VID |
210015 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The e107 Website System is vulnerable to a local file include vulnerability via the 'e_LANGUAGE' cookie variable. e107 is a freely available, Web content management system written in PHP. e107 version 0.7.5 and earlier versions are vulnerable to a local file include vulnerability through the 'e_LANGUAGE' cookie variable, which is used in PHP 'include_once()' functions. By sending a specially-crafted URL request to the gsitemap.php script using the e107language_e107cookie cookie containing "dot dot" sequences (/../) with a local file, regardless of PHP's settings, a remote attacker could view arbitrary files or execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.
* References: http://secunia.com/advisories/20727/ http://milw0rm.com/exploits/2711
* Platforms Affected: e107 version 0.7.5 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of e107 (0.7.6 or later), available from the e107 Web page at http://e107.org/ |
Related URL |
CVE-2006-5786 (CVE) |
Related URL |
20913 (SecurityFocus) |
Related URL |
30030 (ISS) |
|