PT-2013-17: Arbitrary Files Reading in mnoGoSearch
Version: 3.3.12 and earlier
Severity level: High
Impact: Arbitrary Files Reading
Access Vector: Remote
Base Score: 7.8
CVE: not assigned
mnoGoSearch is a universal Intranet and Internet search engine.
Positive Technologies experts have detected an Arbitrary Files Reading vulnerability in mnoGoSearch.
Passing startup parameters via QUERY_STRING (http://tools.ietf.org/html/draft-robinson-www-interface-00#section-7) for an application running in CGI mode can be used to set page template path variable "d". Generating a template file on the server and specifying it in the variable "d" can result in Arbitrary Files Reading via <!INCLUDE CONTENT="URI"> template structure.
---[ Exploitation example]
The /proc/self/environ file, in which part of the template is formed through the PATH_INFO environment variable, can be used as a template.
How to fix
Update your software up to the latest version.
15.02.2013 - Vendor gets vulnerability details
01.03.2013 - Vendor releases fixed version and details
05.03.2013 - Public disclosure
The vulnerabilities has discovered by Sergey Bobrov, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: