| VID |
21891 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The phpWebSite is vulnerable to a local file include vulnerability via the 'hub_dir' parameter. phpWebSite provides an open-source based web site content management system (CMS) written in PHP. phpWebSite version 0.10.2 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'hub_dir' parameter of the 'index.php' script. If 'register_globals' setting is enabled, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.
* References: http://downloads.securityfocus.com/vulnerabilities/exploits/PHPWebSite_fi_poc http://www.milw0rm.com/exploits/1673 http://www.frsirt.com/english/advisories/2006/1361
* Platforms Affected: Appalachian State University, phpWebSite version 0.10.2 and earlier versions Any operating system Any version |
| Recommendation |
No upgrade or patch available as of May 2006.
Upgrade to the latest version of phpWebSite, when new version fixed this problem becomes available from the phpWebSite Web site at http://phpwebsite.appstate.edu/
As a workaround, disable PHP's 'register_globals' setting. |
| Related URL |
CVE-2006-1819 (CVE) |
| Related URL |
17521 (SecurityFocus) |
| Related URL |
25867 (ISS) |
|