Vulnerabilities Disclosure

Path Injection in Simple PHP Blog 0.8.1

Dognædis Ref.: DGS-SEC-15

CVE Ref: CVE-2013-2286

Release Date: 2013/02/25

Discover Credits: CodeV - Code Analyzer

Bulletin Author(s): RAmaro - CodeV Team


Type: Path Injection

Level: High (Low/High/Critical)

CVSS: 4.9 (Av:N/AC:L/Au:S/C:P/I:P/A:C)

Vulnerable Application: Simple PHP Blog 0.8.1

Overview: will give all users a venue to gather basic and complex information about the language, its uses, and recent updates or upgrades made. It will provide developers and people who are not very technical savvy assistance and support to better understand and use the language. The site is committed to provide a helping hand to everyone including tips and suggestions on choosing the web host for your website. It will provide data from the original PHP 5.0 to the PHP 5.4 that comes with all the bells and whistles there is in a modern web language. Articles and discussions on the PHP language, the PHP ecosystem and collaboration will be posted to give users the power to maximize its use when they do use it for their websites.


File: /zip.php Vulnerable Argument(s): $directory

line 26: echo $output;

Proof(s) of Concept:

The referred vulnerabilities could be exploited through Path Injection attacks.
By performing this kind of attack, it is possible to inject files into a non expected location.

Generally, by exploiting this kind of vulnerability, it might be possible to achieve possible attack vectors to various kinds of attacks such as:
- Code injection
- Server Denial of service

The path to the directory should be validated as an being part of the files tree of the application.

Official Solution:
At the moment, there is no official solution for the reported vulnerabilities.

External References:

Download the Vulnerability Report (PDF)

© Copyright 2015 CodeV