  | 
        
  | 
   
 
    
        
      
          | 
  
  
  
    
    
        
	  | 
	Menu | 
	  | 
 
 
    
     
     
     
      
       
       
        
         
         
          
           
						 |  
						 Home |  
 |   |  
						 |  
						 Discussions |  
 |   |  
						 |  
						 Tools |  
 |   |  
						 |  
						 Affiliates |  
 |   |  
						 |  
						 Content |  
 |   |  
						 |  
						 Info |  
 |   |    | 
            
          
         | 
       
     
    | 
    
   
   | 
   
 
 | 
   
 
  
    
    
        
	  | 
	User Info | 
	  | 
 
 
    
     
     
     
      
       
       
        
         
         
          
             Membership: 
  Latest: MichaelSnaRe 
  New Today: 0 
  New Yesterday: 0 
  Overall: 9144 
 
  People Online:
 
  Visitors: 90 
  Members: 0 
  Total: 90 
 | 
            
          
         | 
       
     
    | 
    
   
   | 
   
 
 | 
   
 
  
    
    
        
	  | 
	Full disclosure | 
	  | 
 
 
    
 | 
   
 
 | 
  
    
        
	  | 
	 | 
	  | 
 
 
    
        
          
              
                
                    
                      
                          
                            
                            
	
	
		  | 
		 | 
	 
	
		  | 
		IT Security and Insecurity Portal | 
	 
	 
	 | 
 
 
 
	  | 
	runcms/e-xoops 1.1A and below file upload vulnerability | 
	  | 
 
 
	
	
		 Posted: Sun Apr 10, 2005 3:30 am | 
		      | 
	   | 
 
	
	
		
		
			
			
				
				| y3dips |  
				| Valuable expert |  
				 
   |  
				 |  
				| Joined: Feb 25, 2005 |  
				| Posts: 281 |  
				| Location: Indonesia |  
				  | 
			 
			 
 
  | 
			  | 
		 
		
			  | 
			  | 
		 
		 
 
  | 
		
		
			 	  | Quote: | 	 		  To: 	BugTraq	
 
Subject: 	runcms/e-xoops 1.1A and below file upload vulnerability	
 
Date: 	Apr 6 2005 6:53AM	
 
Author: 	pokley <pokleyzz scan-associates net>	
 
Message-ID: 	<opsoste4qesmddlu@sampah>	
 
	
 
 
Products: runcms/e-xoops 1.1A (http://www.runcms.org)
 
 
Summary:  runcms/e-xoops 1.1A and below file upload vulnerability
 
 
Description
 
===========
 
runcms/e-xoops is an extensible, OO (Object Oriented), easy to use dynamic  
 
web content management system
 
written in PHP. runcms/e-xoops is the ideal tool for developing small to  
 
large dynamic community websites,
 
  intra company portals, corporate portals, weblogs and much more.
 
 
Details
 
=======
 
User may upload any file through file upload function .Example thought  
 
avatar upload when  "Allow custom
 
avatar upload" is set to "Yes" in "Custom avatar settings". This setting  
 
is not on by default installation.
 
This is cause of fileupload class will recursively save any file suppied  
 
by user in upload function.
 
 
-- upload file.php line 240
 
 
if ( !empty($HTTP_POST_FILES) ) {
 
foreach ($HTTP_POST_FILES as $filename => $value) {
 
 
 
Fix
 
===
 
Fix available from runcms/e-xoops forum.
 
http://www.runcms.org/public/modules/newbb_plus/viewtopic.php?topic_id=3493&forum=16
 
 
Vendor Response
 
===============
 
30th March 2005 - Developer contacted through private msg
 
30th March 2005 - Developer reply for testing result
 
31st March 2005 - Developer announce to user to disable avatar upload  
 
setting
 
5th  April 2005 - Fix Available
 
 | 	 
  | 
		 
		  | 
	 
	
		
		
			 _________________ IO::y3dips->new(http://clog.ammar.web.id); | 
		 
		  | 
	 
	  | 
 
	 | 
 
 
  |   
	
	www.waraxe.us Forum Index -> XOOPS 
	
	
		
			You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum 
		 | 
		
			All times are GMT 
			Page 1 of 1
			 
			
		 | 
	 
	 
	 | 
 
	| 
	 | 
 
 
  
Powered by phpBB © 2001-2008 phpBB Group
 
  
 
 
 | 
                           
                         
                         | 
                     
                    | 
               
              | 
         
       
       | 
   
  | 
 
 
 |