Directory traversal vulnerability in phpimglist

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



DESCRIPTION:  There is a vulnerability in phpimglist which allows a user
to traverse through directories outside the web root.  It only shows
directories and image files although there might be a way around this.

Exploit: http://www.site.com/images/?cwd=../../../../
          -or-
          http://www.site.com/images/?cwd=/

UNOFFICIAL FIX:  Around line 76, there is a block like:

if (!$cwd) { $cwd = $SET...... else {
      $cwd = .....
}


Replace this block with the following block:

if (!$cwd) { $cwd = $SETTINGS["rootdir"]; } else {
         $cwd = ereg_replace("\.+","",$cwd);
         $cwd = ereg_replace("^/+","",$cwd);
}

This appears to fix the problem.


VENDOR/AUTHOR STATUS: I contacted the author and got a VERY QUICK
response.  The email transcript is below:

----

Hm.. Thanks  :) I\'ll get that fixed ASAP.. i thought I had put checking
for ../ in , but never tested it :)

if you have any ideas for the script,or find anything else, lemme know..
;]

replying to:
You can traverse directories using the $cwd variable in phpimglist.
Example is:

http://phpimglist.site/?cwd=/
or
http://phpimglist.site/?cwd=../../../../../

This allows you to navigate the filesystem and see any image on the
filesystem, perhaps more..

I added something that I believe fixed it..

if (!$cwd) { $cwd = $SETTINGS[\"rootdir\"]; } else {
         $cwd = ereg_replace(\"\\.+\",\"\",$cwd);
         $cwd = ereg_replace(\"^/+\",\"\",$cwd);
}

You had something similar but it was not working for some reason.

----

Cheers,
Jason DiCioccio
geniusj@ods.org

Open Domain Service
http://www.ods.org/


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux