Re: Vulnerabilities digest
On Tue, 21 Aug 2007, 3APA3A wrote:
> 6. Ivan Niiiil (http://uNkn0wn.eu) reports vulnerabilities in
> Linkliste 1.2, Butterfly online vistors counter 1.08, mcLinksCounter
> 1.2, My_REFERER 1.08.
>
> Original messages in English are available from
> http://securityvulns.com/source26994.html
This issue, originally reported in CVE-2006-4863 for 1.1, was disputed by
CVE and another party because langfile was set to a hard-coded value
(english.php) before the include statement.
For 1.2, there's a different hard-coded value (french.php) but the issue
seems to be the same. From stats.php in 1.2 we have:
include "mclc.php";
include "$langfile";
and mclc.php has the interesting idiom:
if (!empty($_GET)) { extract($_GET, EXTR_OVERWRITE); }
whose security implications should be immediately apparent to PHP
aficionados everywhere. (I refer to this as a "variable extraction
error", CWE-621).
However, after this code, we have:
$langfile="french.php";
french.php itself has no include/require code.
So, if this issue is legitimate, it would be useful to know how this
exploit works.
Thanks,
Steve