VAR-201004-0399
Vulnerability from variot - Updated: 2023-12-18 13:44PHP remote file inclusion vulnerability in include/template.php in Uiga Proxy, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the content parameter. \"Uiga Proxy is a proxy server that allows users behind a firewall/proxy server to access a restricted web site. To successfully exploit this vulnerability, you need to enable the \"\"register_globals\"\" option. \". Uiga Proxy is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. This may facilitate a compromise of the application and the underlying system; other attacks are also possible. ----------------------------------------------------------------------
Secunia CSI + Microsoft SCCM
= Extensive Patch Management
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
TITLE: Uiga Proxy "content" File Inclusion Vulnerability
SECUNIA ADVISORY ID: SA39313
VERIFY ADVISORY: http://secunia.com/advisories/39313/
DESCRIPTION: A vulnerability has been discovered in Uiga Proxy, which can be exploited by malicious people to compromise a vulnerable system.
Input passed to the "content" parameter in include/template.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources.
Successful exploitation requires that "register_globals" is enabled (discouraged for security reasons in README.txt).
SOLUTION: Edit the source code to ensure that input is properly verified.
PROVIDED AND/OR DISCOVERED BY: ItSecTeam
ORIGINAL ADVISORY: http://www.exploit-db.com/exploits/12049
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201004-0399",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "proxy",
"scope": null,
"trust": 1.4,
"vendor": "uiga",
"version": null
},
{
"model": "proxy",
"scope": "eq",
"trust": 1.0,
"vendor": "uiga",
"version": "*"
},
{
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "no",
"version": null
},
{
"model": "proxy",
"scope": "eq",
"trust": 0.3,
"vendor": "uiga",
"version": "0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-0519"
},
{
"db": "BID",
"id": "39365"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-005421"
},
{
"db": "NVD",
"id": "CVE-2010-1528"
},
{
"db": "CNNVD",
"id": "CNNVD-201004-410"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:uiga:proxy:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2010-1528"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ItSecTeam",
"sources": [
{
"db": "BID",
"id": "39365"
},
{
"db": "CNNVD",
"id": "CNNVD-201004-410"
}
],
"trust": 0.9
},
"cve": "CVE-2010-1528",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2010-1528",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2010-1528",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201004-410",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-005421"
},
{
"db": "NVD",
"id": "CVE-2010-1528"
},
{
"db": "CNNVD",
"id": "CNNVD-201004-410"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "PHP remote file inclusion vulnerability in include/template.php in Uiga Proxy, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the content parameter. \\\"Uiga Proxy is a proxy server that allows users behind a firewall/proxy server to access a restricted web site. To successfully exploit this vulnerability, you need to enable the \\\"\\\"register_globals\\\"\\\" option. \\\". Uiga Proxy is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. This may facilitate a compromise of the application and the underlying system; other attacks are also possible. ----------------------------------------------------------------------\n\n\n Secunia CSI\n+ Microsoft SCCM\n-----------------------\n= Extensive Patch Management\n\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nUiga Proxy \"content\" File Inclusion Vulnerability\n\nSECUNIA ADVISORY ID:\nSA39313\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/39313/\n\nDESCRIPTION:\nA vulnerability has been discovered in Uiga Proxy, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nInput passed to the \"content\" parameter in include/template.php is\nnot properly verified before being used to include files. This can be\nexploited to include arbitrary files from local or external\nresources. \n\nSuccessful exploitation requires that \"register_globals\" is enabled\n(discouraged for security reasons in README.txt). \n\nSOLUTION:\nEdit the source code to ensure that input is properly verified. \n\nPROVIDED AND/OR DISCOVERED BY:\nItSecTeam\n\nORIGINAL ADVISORY:\nhttp://www.exploit-db.com/exploits/12049\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2010-1528"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-005421"
},
{
"db": "CNVD",
"id": "CNVD-2010-0519"
},
{
"db": "BID",
"id": "39365"
},
{
"db": "PACKETSTORM",
"id": "88084"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2010-1528",
"trust": 3.3
},
{
"db": "SECUNIA",
"id": "39313",
"trust": 2.4
},
{
"db": "BID",
"id": "39365",
"trust": 1.9
},
{
"db": "EXPLOIT-DB",
"id": "12049",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "63528",
"trust": 1.6
},
{
"db": "JVNDB",
"id": "JVNDB-2010-005421",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2010-0519",
"trust": 0.6
},
{
"db": "XF",
"id": "57515",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201004-410",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "88084",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-0519"
},
{
"db": "BID",
"id": "39365"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-005421"
},
{
"db": "PACKETSTORM",
"id": "88084"
},
{
"db": "NVD",
"id": "CVE-2010-1528"
},
{
"db": "CNNVD",
"id": "CNNVD-201004-410"
}
]
},
"id": "VAR-201004-0399",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-0519"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-0519"
}
]
},
"last_update_date": "2023-12-18T13:44:48.135000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.uiga.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-005421"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-94",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-005421"
},
{
"db": "NVD",
"id": "CVE-2010-1528"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.exploit-db.com/exploits/12049"
},
{
"trust": 1.6,
"url": "http://secunia.com/advisories/39313"
},
{
"trust": 1.6,
"url": "http://www.osvdb.org/63528"
},
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/39365"
},
{
"trust": 1.0,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57515"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1528"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1528"
},
{
"trust": 0.7,
"url": "http://secunia.com/advisories/39313/"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/57515"
},
{
"trust": 0.3,
"url": "http://www.uiga.com/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2010-0519"
},
{
"db": "BID",
"id": "39365"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-005421"
},
{
"db": "PACKETSTORM",
"id": "88084"
},
{
"db": "NVD",
"id": "CVE-2010-1528"
},
{
"db": "CNNVD",
"id": "CNNVD-201004-410"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2010-0519"
},
{
"db": "BID",
"id": "39365"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-005421"
},
{
"db": "PACKETSTORM",
"id": "88084"
},
{
"db": "NVD",
"id": "CVE-2010-1528"
},
{
"db": "CNNVD",
"id": "CNNVD-201004-410"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-04-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2010-0519"
},
{
"date": "2010-04-09T00:00:00",
"db": "BID",
"id": "39365"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-005421"
},
{
"date": "2010-04-05T16:42:56",
"db": "PACKETSTORM",
"id": "88084"
},
{
"date": "2010-04-26T18:30:00.457000",
"db": "NVD",
"id": "CVE-2010-1528"
},
{
"date": "2010-04-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201004-410"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-04-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2010-0519"
},
{
"date": "2015-04-13T21:02:00",
"db": "BID",
"id": "39365"
},
{
"date": "2012-12-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-005421"
},
{
"date": "2017-08-17T01:32:23.710000",
"db": "NVD",
"id": "CVE-2010-1528"
},
{
"date": "2010-04-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201004-410"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201004-410"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Uiga Proxy of include/template.php In PHP Remote file inclusion vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-005421"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201004-410"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.