Dognædis Ref.: DGS-SEC-12
CVE Ref: CVE-2013-2283
Release Date: 2013/03/01
Discover Credits: CodeV - Code Analyzer
Bulletin Author(s): RVenancio - CodeV Team
Contact: [email protected]
Type: Remote File Inclusion
Level: Very High (Low/High/Critical)
CVSS: 4.9 (Av:N/AC:L/Au:S/C:C/I:P/A:P)
Vulnerable Application: Project Pier v 0.8.8
Overview:
ProjectPier is a Free, Open-Source, PHP application for managing tasks, projects and teams through an intuitive web interface. It must be downloaded and installed on your own web server. ProjectPier will help your organization communicate, collaborate and get things done Its function is similar to commercial groupware/project management products, but allows the freedom and scalability of self-hosting
Scope:
Description:
This vulnerability allows an attacker to upload non expected content, for instance a php file, that will be executed while loading the file.
Impact:
Generally, by exploiting this kind of vulnerability, it might be possible to achieve possible attack vectors to various kinds of attacks such as:
- Code execution on the web server
- Code execution on the client
- Denial of Service
Resolution:
Validation of uploaded files by the user should not be made through the headers of the POST request, but by the contents itself.
Official Solution:
At the moment, there is no official solution for the reported vulnerabilities.
External References:
https://www.owasp.org/index.php/PHP_File_Inclusion
http://en.wikipedia.org/wiki/Remote_file_inclusion