[VIM] FALSE --> RE: [UNKNOWN] WordPress v2.1.3 >> remote file include~

Heinbockel, Bill heinbockel at mitre.org
Thu Apr 26 12:19:48 UTC 2007


Looks like someone is using untested automated tools
that report the wrong issue, or is totally clueless:

>From Wordpress 2.1.3:
  $ grep -n -i require_once wp-settings.php
  100:    require_once (ABSPATH . WPINC . '/wp-db.php
  140:require_once (ABSPATH . WPINC . '/l10n.php');
  247:    require_once($locale_file);
  250:require_once(ABSPATH . WPINC . '/locale.php');

The only parameter here that *might* be vulnerable is
$local_file arount line 247:
  $locale = get_locale();
  $locale_file = ABSPATH . LANGDIR . "/$locale.php";
  if ( is_readable($locale_file) )
      require_once($locale_file);

In wp-includes/l10n.php:
  function get_locale() {
      global $locale;

      if (isset($locale))
          return apply_filters( 'locale', $locale );

      // WPLANG is defined in wp-config.
      if (defined('WPLANG'))
          $locale = WPLANG;

      if (empty($locale))
          $locale = '';

      $locale = apply_filters('locale', $locale);

      return $locale;
  }
So, if WPLANG is not defined and the $locale value is
able to bypass whatever filters are defined in apply_filters,
a PoC like "wordpress/wp-settings.php?locale=shell?" MAY work.


Other than that, everything in wp-includes/themes.php is
contained within a function declaration and
wp-includes/template-loader.php
looks be okay.


Just another incompetent vulnerability researcher posting bogus
reports. Why must PHP punish us so?
;-)


William Heinbockel
Infosec Engineer, Sr.
The MITRE Corporation
202 Burlington Rd. MS S145
Bedford, MA 01730
heinbockel at mitre.org
781-271-2615 

>-----Original Message-----
>From: vim-bounces at attrition.org 
>[mailto:vim-bounces at attrition.org] On Behalf Of Noam Rathaus
>Sent: Thursday, 26 April, 2007 03:38
>To: Vulnerability Information Managers
>Subject: [VIM] [UNKNOWN] WordPress v2.1.3 >> remote file include~
>
>Hi,
>
>I am unable to confirm this, anyone?
>
>Looks fake, and untrue, wp-settings.php doesn't use anything called 
>require_once? weird
>
>----------  Forwarded Message  ----------
>
>Subject: WordPress v2.1.3 >> remote file include~
>Date: Wednesday 25 April 2007 11:17
>From: s433d_only_linux at yahoo.de
>To: bugtraq at securityfocus.com
>
>by : www.hackeraz.ir userz , saeid...
>++++++++++++++++++++++++++++++++++++
>####################################################
>#WordPress >> 2.1.3         Remote File Inclusion  #
>####################################################
>Affected Software .: WordPress >> 2.1.3            #
>Download..: http://wordpress-deutschland.org       #
>Risk ..............: high                          #
>Date .........: 25/4/2007                          #
>Found by ..........: s433d_only_linux              #
>Contact ...........: s433d_only_linux at yahoo.de     #
>Web .............: Www.hackerz.ir                  #
>special thanx ........... Ali Jasbi my beste friend#
>####################################################
>Affected File:                                     #
>wordpress/wp-settings.php	                         #
>wordpress/wp-includes/template-loader.php	         #
>wordpress/wp-includes/theme.php	                   #
>####################################################
>Exploit:
>wordpress/wp-settings.php?require_once=shell?
>wordpress/wp-includes/template-loader.php?include=shell?
>wordpress/wp-includes/theme.php?require_once=shell?
>######################################################
>
>-------------------------------------------------------
>
>-- 
>  Noam Rathaus
>  CTO
>  1616 Anderson Rd.
>  McLean, VA 22102
>  Tel: 703.286.7725 extension 105
>  Fax: 888.667.7740
>  noamr at beyondsecurity.com
>  http://www.beyondsecurity.com
>


More information about the VIM mailing list