Korean
<< Back
VID 210057
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Advanced Guestbook software is vulnerable to a local file include vulnerability via the 'lang' cookie. Advanced Guestbook is a guestbook program written in PHP. Advanced Guestbook version 2.4.2 and other versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'lang' cookie before using it as a language template. By sending a specially-crafted request to the index.php script containing "dot dot" sequences (/../) in the lang cookie parameter, a remote attacker could view arbitrary files on the system or execute arbitrary PHP local files with the privileges of the Web server.

* References:
http://www.netvigilance.com/advisory0013
http://archives.neohapsis.com/archives/bugtraq/2007-05/0094.html
http://www.frsirt.com/english/advisories/2007/1726
http://secunia.com/advisories/25153

* Platforms Affected:
proxy2, Advanced Guestbook 2.4.2
Any operating system Any version
Recommendation No upgrade or patch available as of May 2007.

As a workaround, edit the source code to ensure that input is properly verified and sanitised. Or set "register_globals" in php.ini to Off.
Related URL CVE-2007-0609 (CVE)
Related URL 23876 (SecurityFocus)
Related URL 34152 (ISS)