iManager Plugin v1.2.8 (d) Remote Arbitrary File Deletion Vulnerability
Title: iManager Plugin v1.2.8 (d) Remote Arbitrary File Deletion Vulnerability
Advisory ID: ZSL-2011-5043
Type: Local/Remote
Impact: Manipulation of Data
Risk: (3/5)
Release Date: 16.09.2011
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
Apache 2.2.14 (Win32)
PHP 5.3.1
MySQL 5.1.41
[2] http://www.exploit-db.com/exploits/17852/
[3] http://packetstormsecurity.org/files/105193
[4] http://secunia.com/advisories/46063/
[5] http://www.securelist.com/en/advisories/46063
[6] http://www.net-security.org/secworld.php?id=11649
[7] http://1337day.com/exploits/16930
[8] http://securityreason.com/wlb_show/WLB-2011090090
[9] http://xforce.iss.net/xforce/xfdb/69919
[10] http://osvdb.org/show/osvdb/75602
[17.09.2011] - Added reference [1] and [2]
[18.09.2011] - Added reference [3]
[19.09.2011] - Added reference [4]
[20.09.2011] - Added reference [5], [6], [7] and [8]
[22.09.2011] - Added reference [9] and [10]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2011-5043
Type: Local/Remote
Impact: Manipulation of Data
Risk: (3/5)
Release Date: 16.09.2011
Summary
With iManager you can manage your files/images on your webserver, and it provides user interface to most of the phpThumb() functions. It works either stand-alone or as a plugin to WYSIWYG editors like tinyMCE, SPAW, htmlAREA, Xinha and FCKeditor.Description
Input passed to the 'd' parameter in /scripts/phpCrop/crop.php is not properly sanitised before being used to delete files. This can be exploited to delete files with the permissions of the web server via directory traversal sequences passed within the 'd' parameter.--------------------------------------------------------------------------------
/scripts/phpCrop/crop.php
----------------
32: if( isset($_REQUEST['s']) ) {
33: //delete previous temp files
34: $matches = glob($d . '{*.jpg,*.JPG}', GLOB_BRACE);
35: if ( is_array ( $matches ) ) {
36: foreach ( $matches as $fn) {
37: @unlink($fn);
38: }
39: }
--------------------------------------------------------------------------------
Vendor
net4visions.com - http://www.net4visions.comAffected Version
<= 1.2.8 Build 02012008Tested On
Microsoft Windows XP Professional SP3 (EN)Apache 2.2.14 (Win32)
PHP 5.3.1
MySQL 5.1.41
Vendor Status
N/APoC
imanager_del.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] http://www.securityfocus.com/bid/49662[2] http://www.exploit-db.com/exploits/17852/
[3] http://packetstormsecurity.org/files/105193
[4] http://secunia.com/advisories/46063/
[5] http://www.securelist.com/en/advisories/46063
[6] http://www.net-security.org/secworld.php?id=11649
[7] http://1337day.com/exploits/16930
[8] http://securityreason.com/wlb_show/WLB-2011090090
[9] http://xforce.iss.net/xforce/xfdb/69919
[10] http://osvdb.org/show/osvdb/75602
Changelog
[16.09.2011] - Initial release[17.09.2011] - Added reference [1] and [2]
[18.09.2011] - Added reference [3]
[19.09.2011] - Added reference [4]
[20.09.2011] - Added reference [5], [6], [7] and [8]
[22.09.2011] - Added reference [9] and [10]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk