<<< Date Index >>>     <<< Thread Index >>>

Re: Vulnerabilities digest



On Tue, 21 Aug 2007, 3APA3A wrote:

>   6.   Ivan   Niiiil  (http://uNkn0wn.eu)  reports  vulnerabilities  in
>   Linkliste  1.2,  Butterfly online vistors counter 1.08, mcLinksCounter
>   1.2, My_REFERER 1.08.
>
>   Original messages in English are available from
>   http://securityvulns.com/source26994.html

This issue, originally reported in CVE-2006-4863 for 1.1, was disputed by
CVE and another party because langfile was set to a hard-coded value
(english.php) before the include statement.

For 1.2, there's a different hard-coded value (french.php) but the issue
seems to be the same.  From stats.php in 1.2 we have:

  include "mclc.php";
  include "$langfile";

and mclc.php has the interesting idiom:

  if (!empty($_GET)) { extract($_GET, EXTR_OVERWRITE); }

whose security implications should be immediately apparent to PHP
aficionados everywhere.  (I refer to this as a "variable extraction
error", CWE-621).

However, after this code, we have:

         $langfile="french.php";

french.php itself has no include/require code.

So, if this issue is legitimate, it would be useful to know how this
exploit works.


Thanks,
Steve