Open-Realty "select_users_lang" and "select_users_template" Local File Inclusion


Description   Two vulnerabilities has been discovered in Open-Realty, which can be exploited by malicious people to disclose potentially sensitive information.
1) Input passed via the "select_users_lang" POST parameter to index.php is not properly verified before being used to include files. This can be exploited to include files from local resources via directory traversal attacks and URL-encoded NULL bytes.
This vulnerability is reported in version 2.5.7 and confirmed in version 2.5.8. Other versions may also be affected.
2) Input passed via the "select_users_template" POST parameter to index.php is not properly verified before being used to include files. This can be exploited to include files from local resources via directory traversal attacks and URL-encoded NULL bytes.
This vulnerability is confirmed in version 2.5.8. Other versions may also be affected.
     
Vulnerable Products   Vulnerable Software:
Open-Realty 2.x
     
Solution   Edit the source code to ensure that input is properly verified.
     
CVE  
     
References   Aung Khant:
http://yehg.net/lab/pr0js/advisories/[open-realty_2.5.8_2.x]_lfi
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Escaped NULL char in URL
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2010-08-19 

 Target Type 
Server 

 Possible exploit 
Remote