Korean
<< Back
VID 21858
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Owl Intranet Engine is vulnerable to a remote file include vulnerability in the 'lib/OWL_API.php' script. Owl Intranet Engine is a multi-user document repository (knowledge base) system written in PHP4 for publishing of files/documents onto the Web. Owl Intranet Engine version 0.82 and other versions could allow a remote attacker to include malicious PHP files, caused by improper validation of user-supplied input passed to the 'xrms_file_root' parameter of the 'lib/OWL_API.php' script. If PHP's 'register_globals' setting is enabled, a remote attacker can send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.

* References:
http://downloads.securityfocus.com/vulnerabilities/exploits/owl_082_xpl.pl
http://www.frsirt.com/english/advisories/2006/0868
http://secunia.com/advisories/19142/

* Platforms Affected:
Owl Intranet Engine version 0.82 and other versions
Any operating system Any version
Recommendation No upgrade or patch available as of March 2006.

Upgrade to a version of Owl greater than 0.82, when new fixed version becomes available from the Owl Download Web site at http://owl.sourceforge.net/modules/Download/
Related URL CVE-2006-1149 (CVE)
Related URL 17021 (SecurityFocus)
Related URL 25082 (ISS)