[UNIX] Opt-X File Inclusion Vulnerability
From: SecuriTeam (support_at_securiteam.com)
To: firstname.lastname@example.org Date: 26 Feb 2004 13:03:59 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Opt-X File Inclusion Vulnerability
<http://www.opt-x.org/> Opt-X is "primarily a network monitoring tool for
content/URLs and network services, but it also has some other functions
such as, task list, server list, log changes for servers and a vendor
list". A vulnerability in Opt-x allows an attacker to influence the
include path for PHP scripts.This could be exploited to include a
malicious script that is hosted on an attacker-controlled server. allowing
for execution of arbitrary code in the context of the web server.
* Opt-X version 0.7.2
There's a file inclusion vulnerability in the /includes/header.php file,
<?php include("".$systempath."/includes/menu.php"); ?>
Is it possible for a remote attacker to include an external file and
execute arbitrary commands with the privileges of the webserver (nobody by
To test the vulnerability try this:
In this way the file "http://attackersite/includes/menu.php" will be
included and executed on the vulnerable server.
The information has been provided by <mailto:email@example.com> G00db0y
from Zone-h Security Labs.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.