severity 373731 serious
tags 373731 security confirmed upstream
thanks

On Thu, Jun 15, 2006 at 02:42:01PM +0200, Oliver Paulus wrote:
> There is a local file include vulnerability in redirect.php (information
> disclosure).
> 
> For more information see: http://www.securityfocus.com/bid/18231
> 
> Example URI: http://www.example.com/[squirrelmail
> dir]/src/redirect.php?plugins[]=../../../../etc/passwd%00

Ugh, both file_exists and include_once (!) simply work on the filename
up until the first nul byte. I see that the plugins[] array is actually
never reset in the squirrelmail source or configuration, allowing for
this kind of things.

Since this allows to include (and execute) arbitrary local files,
including ones in /tmp, this seems like to be at least a local arbitrary
code execution vulnerability. It's not even required to be logged in, of
course, to plant an attacking php script in /tmp or so requires a local
account, or alternatively, some other vulnerability.

Thanks for reporting,
--Jeroen

-- 
Jeroen van Wolffelaar
[EMAIL PROTECTED] (also for Jabber & MSN; ICQ: 33944357)
http://Jeroen.A-Eskwadraat.nl


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to