jpgasstrom Posted March 18, 2005 Posted March 18, 2005 Don't know if anyone is using PHPOpenChat, but if so see http://secunia.com/advisories/14600/ Secunia Advisory: SA14600 Release Date: 2005-03-16 Critical: Highly critical Impact: System access Where: From remote Solution Status: Unpatched Software: PHPOpenChat 3.x Description: Mafia_Boy has reported a vulnerability in PHPOpenChat, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the "sourcedir" parameter in "contrib/yabbse/poc.php" is not properly verified, before it is used to include files. This can be exploited to include arbitrary files from external and local resources. Successful exploitation requires that "register_globals" is enabled. The vulnerability has been reported in version 3.0.1 and prior. Solution: Edit the source code to ensure that input is properly sanitised. Provided and/or discovered by: Mafia_Boy, Albania Security Clan. Original Advisory: http://www.albanianhaxorz.org/advisory/phpopenchaten.txt Quote
TCH-Bruce Posted March 18, 2005 Posted March 18, 2005 Yes, thank you for the information. I'm sure it may help some users. Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.