[UNIX] Stud.IP File Inclusion



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Stud.IP File Inclusion
------------------------------------------------------------------------


SUMMARY

" <http://www.studip.de/> Stud.IP is a learning and an information
management system for universities, educational facilities and
enterprises."

Improper user validation allows attackers to execute arbitrary PHP code
using Stud.IP.

DETAILS

Vulnerable Systems:
* studip version 1.3.0-2 and prior

Input passed to the "_PHPLIB[libdir]" parameter in
studip-phplib/oohforms.inc and to the "ABSOLUTE_PATH_STUDIP" parameter in
studip-htdocs/archiv_assi.php is not properly verified before being used
to include files.
This can be exploited to execute arbitrary PHP code by including files
from local or external resources.


Vulnerable Code :
[path]/studip-1.3.0-2/studip-phplib/oohforms.inc
//Vulnerable Code :line 378
include($_PHPLIB["libdir"] . "of_text.inc");
include($_PHPLIB["libdir"] . "of_select.inc");
include($_PHPLIB["libdir"] . "of_radio.inc");
include($_PHPLIB["libdir"] . "of_checkbox.inc");
include($_PHPLIB["libdir"] . "of_textarea.inc");
include($_PHPLIB["libdir"] . "of_file.inc");

Vulnerable Code :
[path]/studip-1.3.0-2/studip-htdocs/archiv_assi.php
//Vulnerable Code :line 22
require_once($ABSOLUTE_PATH_STUDIP . "dates.inc.php");
// Funktionen zum Loeschen von Terminen
require_once($ABSOLUTE_PATH_STUDIP . "datei.inc.php");
// Funktionen zum Loeschen von Dokumenten


========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [UNIX] Cerberus Helpdesk Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Cerberus Helpdesk Vulnerabilities ... trigger SQL injection and cross site scripting vulnerabilities. ... Vulnerable code: ...
    (Securiteam)
  • [UNIX] Multiple Vulnerabilities in MercuryBoard
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... MercuryBoard has been found to contain multiple security vulnerabilities. ... Vulnerable code: ... Other ways that you can cause a cross site scripting in MercuryBoard: ...
    (Securiteam)
  • [UNIX] LinksCaffe SQL Injection Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Vulnerable code in line 223 in links.php code: ... $link_id var are not sanitized before to be used to conduct SQL injection ... conduct XSS attacks ...
    (Securiteam)
  • [UNIX] Multiples Vulnerabilities In JAWS
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Vulnerable Code: ... Cross site scripting is possible in the variable action, ...
    (Securiteam)
  • [UNIX] Squirrelmail Change_passwd Buffer Overflow
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... plugin, is "a Squirrelmail plugin to allow your users to change his/her ... The vulnerable code is inside mainfunction that neglects to verify ... GNU gdb 6.0-debian ...
    (Securiteam)