Korean
<< Back
VID 21859
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The PhpGedView program is vulnerable to multiple vulnerabilities which exist in versions 3.3.7 and earlier. The PhpGedView is a freely available Web-based program that displays genealogy information. PhpGedView version 3.3.7 and earlier versions are vulnerable to multiple vulnerabilities as follows:

1) Input passed to the "PGV_BASE_DIRECTORY" parameter in the "help_text_vars.php" script isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from external and local resources, and allow a remote attacker to view arbitrary files or execute arbitrary code on the system. Successful exploitation requires that "register_globals" is enabled.
2) Input passed to the "user_language", "user_email", and "user_gedcomid" parameters when registering isn't properly sanitized before being stored in the "authenticate.php" script. This can be exploited to inject and execute arbitrary PHP code.

* References:
http://retrogod.altervista.org/phpgedview_337_xpl.html
https://sourceforge.net/tracker/index.php?func=detail&aid=1386434&group_id=55456&atid=477081
http://archives.neohapsis.com/archives/bugtraq/2005-12/0243.html
http://secunia.com/advisories/18177/

* Platforms Affected:
John Finlay, PhpGedView version 3.3.7 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of PhpGedView (3.3.8 or later), available from the PhpGedView Web page at http://phpgedview.sourceforge.net/
Related URL CVE-2005-4467,CVE-2005-4468,CVE-2005-4469 (CVE)
Related URL 15983 (SecurityFocus)
Related URL 23871,23873 (ISS)