Korean
<< Back
VID 21892
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The PHPlist is vulnerable to a local file include vulnerability via the $database_module variable. PHPlist is a web application that implements a personalized mailing list manager or customer relationship management (CRM) system, written in PHP. PHPlist version 2.10.2 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the $database_module or $language_module variable of the 'lists/index.php' script. If 'register_globals' setting is enabled, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.

* References:
http://www.securityfocus.com/archive/1/430475/30/30/threaded
http://www.securityfocus.com/archive/1/430597
http://www.hardened-php.net/advisory_202005.79.html
http://tincan.co.uk/?lid=851
http://www.milw0rm.com/exploits/1659

* Platforms Affected:
Open Source, PHPlist version 2.10.2 and earlier versions
Any operating system Any version
Recommendation No upgrade or patch available as of May 2006.

Upgrade to the latest version of PHPlist, when new version fixed this problem becomes available from the PHPlist Web site at http://www.phplist.com/files/

-- OR --

Upgrade to the latest version of PHP (4.4.1 or 5.0.5 or later), as described in the Hardened PHP Project Advisory 20/2005 at http://www.hardened-php.net/advisory_202005.79.html
Related URL CVE-2006-1746 (CVE)
Related URL 17429 (SecurityFocus)
Related URL 25701 (ISS)