1
Secunia Advisory: SA17573 Print Advisory
Release Date: 2005-11-15
Critical:
Moderately critical
Impact: Exposure of sensitive information
Where: From remote
Solution Status: Unpatched
Software: Xoops 2.x
Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.
Description:
rgod has discovered a vulnerability in Xoops, which can be exploited by malicious people to disclose sensitive information.
Input passed to the "xoopsConfig[language]" parameter in "class/xoopseditor/textarea/editor_registry.php" isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from local resources.
Successful exploitation requires that "register_globals" is enabled and that "magic_quotes_gpc" is disabled.
The vulnerability has been confirmed in version 2.2.3. Other versions may also be affected.
Solution:
Edit the source code to ensure that input is properly verified.
Set "register_globals" to "Off".
Provided and/or discovered by:
rgod
source:
http://secunia.com/advisories/17573/