Jump to content
Praetorian503

DataLife Engine 9.7 PHP Code Injection

Recommended Posts

DataLife Engine version 9.7 suffers from a PHP code injection vulnerability in preview.php.

------------------------------------------------------------------
DataLife Engine 9.7 (preview.php) PHP Code Injection Vulnerability
------------------------------------------------------------------

• Software Link:

http://dleviet.com/


• Affected Version:

9.7 only.


• Vulnerability Description:

The vulnerable code is located in the /engine/preview.php script:

246. $c_list = implode (',', $_REQUEST['catlist']);
247.
248. if( strpos( $tpl->copy_template, "[catlist=" ) !== false ) {
249. $tpl->copy_template = preg_replace(
"#\\[catlist=(.+?)\\](.*?)\\[/catlist\\]#ies", "check_category('\\1',
'\\2', '{$c_list}')", $tpl->copy_template );
250. }
251.
252. if( strpos( $tpl->copy_template, "[not-catlist=" ) !== false ) {
253. $tpl->copy_template = preg_replace(
"#\\[not-catlist=(.+?)\\](.*?)\\[/not-catlist\\]#ies",
"check_category('\\1', '\\2', '{$c_list}', false)", $tpl->copy_template
);
254. }

User supplied input passed through the $_REQUEST['catlist'] parameter
is not properly
sanitized before being used in a preg_replace() call with the e
modifier at lines 249 and 253.
This can be exploited to inject and execute arbitrary PHP code.
Successful exploitation of
this vulnerability requires a template which contains a “catlist” (or a
“not-catlist”) tag.


• Solution:

Apply the vendor patch:
http://dleviet.com/dle/bug-fix/3281-security-patches-for-dle-97.html


• Disclosure Timeline:

[16/01/2013] – Vendor notified
[19/01/2013] – Vendor patch released
[20/01/2013] – CVE number requested
[21/01/2013] – CVE number assigned
[28/01/2013] – Public disclosure


• CVE Reference:

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2013-1412 to this vulnerability.


• Credits:

Vulnerability discovered by Egidio Romano.


• Original Advisory:

http://karmainsecurity.com/KIS-2013-01

Source: PacketStorm

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...