Multiple vulnerabilities in phpMyVisites Application : phpMyVisites prior to 2.2 stable Release Date : 11 February 2007 Author : Nicob <nicob at nicob.net> Abstract : ========== Several vulnerabilities were identified in phpMyVisites. This software is "a free and powerful open source (GNU/GPL) software for websites statistics and audience measurements" : http://www.phpmyvisites.net/ Impacted versions : =================== Versions 2.2 stable (released on November 10, 2006) and newer are not impacted by these vulnerabilities. Notes : ======= - only one PHP file (phpmyvisites.php) need to be remotely accessed by visitors. A paranoid installation will allow remote access only to this file (for example via htaccess). So my brief code audit focused on this very file. - external libraries (smarty, phpMailer, PEAR, ...) are embedded in any phpMyVisites install. Some vulnerabilities in these libraries were patched in version 2.2 stable too. Vulnerabilities : ================= - "HTTP Response Splitting" via the "url" parameter (triggered when the "pagename" parameter begins by "FILE:") - "Cross Site Scripting" in function GetCurrentCompletePath() : http://your_site/your_dir/phpmyvistes.php/AAA/B