Korean
<< Back
VID 21457
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The ZeroBoard software are vulnerable to a remote PHP Include vulnerability in the 'dir'
parameter of the 'error.php' script. ZeroBoard is a freely available, open source PHP-based bulletin board software, and widely used in Korea. ZeroBoard versions 4.1pl5 and earlier could allow a remote attacker to execute arbitrary commands on the affected host, when both the 'allow_url_fopen' and 'register_globals' directives are enabled, caused by a design flaw in the error.php script. By specifying a malicious include file in the "dir" parameter of the "error.php" script, a remote attacker could execute arbitrary code on the system with privileges of the Web server.

* References:
http://www.optik4lab.com/modules/news/article.php?storyid=13

* Platforms Affected:
ZeroBoard versions 4.1pl5 and earlier
Any operating system Any version
Recommendation No upgrade or patch available as of January 2005.

Upgrade to the new version of ZeroBoard (4.1pl6 or later), when new version fixed this problem becomes available from the ZeroBoard Web Site at http://www.nzeo.com/

-- OR --

As a workaround for this and similar issues, disable the 'allow_url_fopen' and 'register_globals' directives in the local site PHP configuration.
Related URL CVE-2005-0379,CVE-2005-0380 (CVE)
Related URL 12206 (SecurityFocus)
Related URL 18891,18892 (ISS)