Korean
<< Back
VID 21920
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The w-Agora program is vulnerable to multiple remote file include vulnerabilities via the 'inc_dir' parameter. w-Agora is a freely available Web forum and publishing program for Microsoft Windows, Linux, and Unix-based operating systems written by PHP. w-Agora version 4.2.0 and possibly earlier versions are vulnerable to multiple remote file include vulnerabilities, caused by improper validation of user-supplied input passed to the 'inc_dir' parameter of the several scripts. If the register_globals is disabled, a remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.

* References:
http://advisories.echo.or.id/adv/adv34-theday-2006.txt
http://secunia.com/advisories/20779/

* Platforms Affected:
Marc Druilhe, w-Agora version 4.2.0 and possibly earlier versions
Any operating system Any version
Recommendation No upgrade or patch available as of July 2006.

Upgrade to a version of w-Agora greater than 4.2.0, when new fixed version becomes available from the w-Agora Web site at http://www.w-agora.net/en/download.php

As a workaround, enable PHP's 'register_globals' setting.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)