search menu icon-carat-right cmu-wordmark

CERT Coordination Center

PhpWiki fails to properly restrict uploaded files

Vulnerability Note VU#914793

Original Release Date: 2007-04-12 | Last Revised: 2007-04-13

Overview

PhpWiki fails to properly restrict uploaded files, which can allow a remote attacker to execute arbitrary commands on a vulnerable system.

Description

PhpWiki is Wiki software that is implemented in PHP. PhpWiki includes an "UpLoad" feature that allows users to upload files. Files with a .php extension are not permitted, however other extensions are allowed. This can allow an attacker to upload a file that can be processed by PHP on the PhpWiki server.

Note that this vulnerability is being actively exploited.

Impact

A remote attacker may be able to execute arbitrary PHP code on a vulnerable server. This can allow arbitrary command execution on the system.

Solution

We are currently unaware of a practical solution to this problem.

Disallow uploads

PhpWiki can be configured to disallow uploads by moving or removing lib/plugin/UpLoad.php.

Restrict uploads of PHP files

This vulnerability can be mitigated by restricting the ability to upload PHP files. This can be accomplished by adding the following lines to the list of disallowed extensions:
.php
.phtml
.php3
.php4
.php5
Note that this list may not be exhaustive. Other web server and PHP configurations may allow other file extensions to be processed by PHP.

Vendor Information

No information available at this time.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

Thanks to Reini Urban for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

CVE IDs: None
Severity Metric: 18.42
Date Public: 2007-04-08
Date First Published: 2007-04-12
Date Last Updated: 2007-04-13 14:47 UTC
Document Revision: 7

Sponsored by CISA.