Security Advisory 2007-02-18

Remote code execution vulnerability in phpMyFAQ 1.6.x

Issued on:
2007-02-18
Software:
phpMyFAQ <= 1.6.9
Risk:
High
Platforms:
all

The phpMyFAQ Team has learned about a vulnerability in the code that could be exploited in

phpMyFAQ 1.6.x.

Description

Through the vulnerability it is possible to gain the privilege for uploading files on the server

when register_globals is activated: currently no public exploit is available but some users

already reported us to be hacked and the r57shell script has been installed on

their systems.

Solution

The phpMyFAQ Team has released the new phpMyFAQ version 1.6.10 which fixes the vulnerability.

All users of the affected phpMyFAQ versions are encouraged to upgrade as soon as possible to

this latest version.

Workaround

If it's possible for you set register_globals to off in your php.ini configuration settings.

Credits

The phpMyFAQ Team would like to thank François Maillet and Enrico Fischer (Powerserver-Germany

webHosting & DomainServices) for reporting the vulnerability, and Johannes Schlüter for

discovering and fixing the issue.