Vulnerability Note VU#914793

PhpWiki fails to properly restrict uploaded files

Original Release date: 12 Apr 2007 | Last revised: 13 Apr 2007

Overview

PhpWiki fails to properly restrict uploaded files, which can allow a remote attacker to execute arbitrary commands on a vulnerable system.

Description

PhpWiki is Wiki software that is implemented in PHP. PhpWiki includes an "UpLoad" feature that allows users to upload files. Files with a .php extension are not permitted, however other extensions are allowed. This can allow an attacker to upload a file that can be processed by PHP on the PhpWiki server.

Note that this vulnerability is being actively exploited.

Impact

A remote attacker may be able to execute arbitrary PHP code on a vulnerable server. This can allow arbitrary command execution on the system.

Solution

We are currently unaware of a practical solution to this problem.

Disallow uploads

PhpWiki can be configured to disallow uploads by moving or removing lib/plugin/UpLoad.php.

Restrict uploads of PHP files

This vulnerability can be mitigated by restricting the ability to upload PHP files. This can be accomplished by adding the following lines to the list of disallowed extensions:

    .php
    .phtml
    .php3
    .php4
    .php5
Note that this list may not be exhaustive. Other web server and PHP configurations may allow other file extensions to be processed by PHP.

Systems Affected (Learn More)

No information available. If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Reini Urban for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

  • CVE IDs: Unknown
  • Date Public: 08 Apr 2007
  • Date First Published: 12 Apr 2007
  • Date Last Updated: 13 Apr 2007
  • Severity Metric: 18.42
  • Document Revision: 7

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.