[VIM] Looks Bogus: SPIP v1.7 Remote File Inclusion Bug
    George A. Theall 
    theall at tenablesecurity.com
       
    Thu Aug 23 18:15:45 UTC 2007
    
    
  
The remote file include issue in SPIP reported by system-errrror here:
   http://www.securityfocus.com/archive/1/477423/30/0/threaded
looks bogus to me. The code snippet claimed to show the vulnerability 
occurs in a function call shortly after the affected variable is set; ie:
                        ---- snip, snip, snip ----
function executer_squelette($squelette, $contexte) {
...
         if (!$fonctions_squelettes[$squelette]) {
                 $squelette_cache = 
'CACHE/skel_'.rawurlencode($squelette).'.php3';
...
                 include($squelette_cache);
                        ---- snip, snip, snip ----
This is from inc-calcul.php3 from version 1.7.2, 
http://www.spip.net/spip-dev/devel/archive/SPIP-v1-7-2.zip
Now I admit, I didn't bother setting up the app or tracing the code 
between where it's set and used above, but it sure smells bogus.
George
-- 
theall at tenablesecurity.com
    
    
More information about the VIM
mailing list