mailing list archives
Re: Open-Realty CMS 2.5.8 (2.x.x) <= "select_users_template" Local File Inclusion Vulnerability
From: Kurt Seifried <kseifried () redhat com>
Date: Mon, 05 Mar 2012 15:09:03 -0700
On 03/05/2012 09:03 AM, YGN Ethical Hacker Group wrote:
Open-Realty 2.5.8 and lower versions are vulnerable to Local File Inclusion.
Open-Realty is the world's leading real estate listing marketing and
management CMS application, and has enjoyed being the real estate web
site software of choice for professional web site developers since
3. VULNERABILITY DESCRIPTION
Open-Realty contains a flaw that may allow a remote attacker to
execute arbitrary commands or code. The issue is due to the
'index.php' script not properly sanitizing user input, specifically
directory traversal style attacks (e.g., ../../) supplied to the
'select_users_template' parameter. This may allow an attacker to
include a file from the targeted host that contains arbitrary commands
or code that will be executed by the vulnerable script. Such attacks
are limited due to the script only calling files already on the target
host. In addition, this flaw can potentially be used to disclose the
contents of any file on the system accessible by the web server.
4. VERSIONS AFFECTED
2.5.8 (2.x.x) <=
The version 2.5.x version family is no longer maintained by the vendor.
The version 3.x.x is not found to be vulnerable to this issue. Upgrade
to the latest 3.x.x version.
Transparent Technologies Inc.
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-03-05: Open-Realty 2.5.8 in End-of-Support/Maintenance circle
2012-03-05: Vulnerability disclosed
Original Advisory URL:
Open-Realty Home Page: http://www.open-realty.org/
CWE-98: Improper Control of Filename for Include/Require Statement in
PHP Program ('PHP File Inclusion')
CAPEC-252: PHP Local File Inclusion
Please use CVE-2012-1112 for this issue.
Kurt Seifried Red Hat Security Response Team (SRT)