[UNIX] phpSysInfo Information Disclosure



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



phpSysInfo Information Disclosure
------------------------------------------------------------------------


SUMMARY

" <http://phpsysinfo.sourceforge.net/> phpSysInfo is a PHP script that
displays information about the host being accessed."

Improper design allows attackers to gain information about files on a
server using phpSysInfo.

DETAILS

Vulnerable Systems:
* phpSysInfo version 2.5.1

A vulnerability which allows an attacker to identify if a file exists on
the remote system has been identified. By supplying a directory traversal
string to lng= in a POST or GET request to index.php with a poison null
byte terminating %00 allows an attacker to determine if any file exists.

The vulnerable function is shown.

if (!file_exists(APP_ROOT . '/includes/lang/' . $lng
'.php')) {

An attacker can determine if the file exists by studying the returned
error message, valid files return the string ?Sorry, we don't support this
language.? and invalid files return the normal phpSysInfo application
page.

Example:
www.somesite.com/phpSysInfo/index.php?template=blue&lng=../../../../../../../../../../../var/log/httpd-error.log%00


ADDITIONAL INFORMATION

The information has been provided by <mailto:wh1t3h4t3@xxxxxxxxxxx>
Micheal Turner.



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NT] Microsoft Windows Graphics Device Interface Integer Overflow Vulnerability (MS08-071)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Microsoft Windows Graphics Device Interface Integer Overflow Vulnerability ... Exploitation allows an attacker to execute arbitrary code with the ... targeted user to view a specially crafted image file. ...
    (Securiteam)
  • [NT] EMC Legato Networker DoS and Multiple Buffer Overflows
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... EMC Legato Networker DoS and Multiple Buffer Overflows ... The vulnerability specifically exists due to improper handling of ... is sent by an attacker, it is possible to overwrite portions of heap ...
    (Securiteam)
  • [UNIX] IBM Informix Dynamic Server DBLANG Directory Traversal Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... IBM Informix Dynamic Server DBLANG Directory Traversal Vulnerability ... Local exploitation of a directory traversal vulnerability in IBM Corp.'s ... attacker can cause set-uid binaries to use Native Language Support ...
    (Securiteam)
  • [NEWS] IBM Lotus Domino IMAP Buffer Overflow Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... IBM Lotus Domino IMAP Buffer Overflow Vulnerability ... Remote exploitation of a buffer overflow vulnerability within IBM Corp.'s ... This allows an attacker to take complete control of the compromised ...
    (Securiteam)
  • [UNIX] phpSysInfo Multiple Vulnerabilities (HTTP_ACCEPT_LANGUAGE, sensor_program, VERSION, charset)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Multiple vulnerabilities have been discovered in phpSysInfo allowing ... the attacker to additionally inject the $lng parameter. ... $sensor_program can *still* be used to inject active ...
    (Securiteam)