exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

PHProjekt-5.1.1.txt

PHProjekt-5.1.1.txt
Posted Oct 4, 2006
Authored by Stefan Esser | Site hardened-php.net

PHProjekt 5.1.1 suffers from a flaw that could allow attackers to include remote php files.

tags | advisory, remote, php
SHA-256 | aa12a2eced2ce5f6ffbf950f407376aa21d5c08203dfc01de189419559e35eb0

PHProjekt-5.1.1.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Hardened-PHP Project
www.hardened-php.net

-= Security Advisory =-


Advisory: PHProjekt (Remote) Include Vulnerabilities
Release Date: 2006/09/29
Last Modified: 2006/09/29
Author: Stefan Esser [sesser@hardened-php.net]

Application: PHProjekt 5.1.1
Severity: An unverified path may allow an attacker to inject
and execute arbitrary PHP code
Risk: Critical
Vendor Status: Vendor has a released an updated version
References: http://www.hardened-php.net/advisory_062006.129.html


Overview:

Quote from http://www.phprojekt.com
"PHProjekt is a modular application for the coordination of group
activities and to share informations and document via intranet and
internet. Components of PHProjekt: Group calendar, project
management, time card system, file management, contact manager,
mail client and 9 other modules ...(feature list).
PHProjekt supports many protocols like ldap, soap and webdav and is
available for 36 languages and 7 databases."

While searching for applications that are vulnerable to a new class
of vulnerabilities inside PHP applications we took a quick look
into the current PHProjekt source code and discovered that a (remote)
include vulnerability had been (re)introduced.

By overwriting a variable with user input it is possible to inject
and execute arbitrary PHP code. Overwriting this variable is possible
regardless of the register_globals setting.

It is recommended to install our Suhosin (http://www.suhosin.org)
PHP extension, because it is the only solution that stops 100% of
all URL includes. Please note that allow_url_fopen is NOT a 100%
protection because it does NOT stop all URL types.

Details:

PHProjekt includes several files from different paths. In earlier
versions it was possible to overwrite the base path variable
$path_pre from the outside and use it to include arbitrary files
or URLs. This vulnerability had been fixed by checking the content
of $path_pre and bailing out of the PHP script in case of an
attack.

Unfortunately the code within PHProjekt was moved around, which
resulted in $lib_path and $lang_path beeing filles before the
request variables are extracted into the global namespace by the
PHP script. (This globalisation is done by the code of PHProjekt
and has nothing todo with PHP's register_globals feature).

Because of this construction it is possible to include arbitrary
PHP files by filling $lib_path or $lang_path through f.e. the URL.

This vulnerability was now fixed by modifying all include paths
to use constants instead of variables, because constants cannot
be overwritten once they are set.


Proof of Concept:

The Hardened-PHP Project is not going to release exploits for
this vulnerability to the public.


Disclosure Timeline:

21. September 2006 - Contacted PHProjekt developers by email
28. September 2006 - Updated PHProjekt was released
29. September 2006 - Public Disclosure


Recommendation:

It is strongly recommended to upgrade to the newest version of
PHProejekt 5.1.2 which you can download at:

http://www.phprojekt.com/download/phprojekt.tar.gz

As usual we very stronlgy recommend to install our Suhosin PHP
extension, because it is the only solution that stops all
PHP remote URL includes. The often advertised allow_url_fopen
configuration directive does NOT protect against 'php://input'
or 'data:' URL types. Suhosin additionally can stop several
directory traversal attacks that try to include local files.

Grab your copy and more information at:

http://www.hardened-php.net/suhosin/index.html


GPG-Key:

http://www.hardened-php.net/hardened-php-signature-key.asc

pub 1024D/0A864AA1 2004-04-17 Hardened-PHP Signature Key
Key fingerprint = 066F A6D0 E57E 9936 9082 7E52 4439 14CC 0A86 4AA1


Copyright 2006 Stefan Esser. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFFHQmFRDkUzAqGSqERAsoTAJ4gmFLTcReHvo6EvtxlZXHI41tPDgCg1ppS
7THEd6ldw69+Hx9dO9zkcew=
=NXXs
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close