Secunia Security Advisory - RedTeam has reported two vulnerabilities in PAJAX, which can be exploited by malicious people to compromise a vulnerable system.
177dfa247aa98bc090f55124f7b7727fc0312e029e21d8fe0c0ade6c6ce7c5b2
TITLE:
PAJAX Arbitrary Code Execution Vulnerabilities
SECUNIA ADVISORY ID:
SA19653
VERIFY ADVISORY:
http://secunia.com/advisories/19653/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
PAJAX 0.x
http://secunia.com/product/9353/
DESCRIPTION:
RedTeam has reported two vulnerabilities in PAJAX, which can be
exploited by malicious people to compromise a vulnerable system.
1) Input passed to the "method" and "args" parameters in
pajax_call_dispatcher.php is not properly sanitised before being
used. This can be exploited to inject and execute arbitrary PHP code
on the system.
2) Input passed to the "className" variable is not properly sanitised
before being used to include files. This can be exploited to include
arbitrary .class.php files on the system via directory traversal
attacks.
The vulnerabilities have been reported in version 0.5.1. Prior
versions may also be affected.
SOLUTION:
Update to version 0.5.2.
http://download.auberger.com/pajax-0.5.2.zip
PROVIDED AND/OR DISCOVERED BY:
RedTeam
ORIGINAL ADVISORY:
http://www.redteam-pentesting.de/advisories/rt-sa-2006-001.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------