VID |
21892 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The PHPlist is vulnerable to a local file include vulnerability via the $database_module variable. PHPlist is a web application that implements a personalized mailing list manager or customer relationship management (CRM) system, written in PHP. PHPlist version 2.10.2 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the $database_module or $language_module variable of the 'lists/index.php' script. If 'register_globals' setting is enabled, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.
* References: http://www.securityfocus.com/archive/1/430475/30/30/threaded http://www.securityfocus.com/archive/1/430597 http://www.hardened-php.net/advisory_202005.79.html http://tincan.co.uk/?lid=851 http://www.milw0rm.com/exploits/1659
* Platforms Affected: Open Source, PHPlist version 2.10.2 and earlier versions Any operating system Any version |
Recommendation |
No upgrade or patch available as of May 2006.
Upgrade to the latest version of PHPlist, when new version fixed this problem becomes available from the PHPlist Web site at http://www.phplist.com/files/
-- OR --
Upgrade to the latest version of PHP (4.4.1 or 5.0.5 or later), as described in the Hardened PHP Project Advisory 20/2005 at http://www.hardened-php.net/advisory_202005.79.html |
Related URL |
CVE-2006-1746 (CVE) |
Related URL |
17429 (SecurityFocus) |
Related URL |
25701 (ISS) |
|