Pluck 4.5.1 (blogpost) Local File Inclusion Vulnerability (win only)

2008.07.16
Credit: AmnPardaz
Risk: Medium
Local: No
Remote: Yes
CWE: Not in CWE


Ogólna skala CVSS: 6.8/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

########################## www.BugReport.ir ######################### # # AmnPardaz Security Research Team # # Title: Pluck Local File inclusion # Vendor: http://www.pluck-cms.org # Bug: Local File Inclusion # Vulnerable Version: 4.5.1 (prior versions also may be affected) # Exploitation: Remote with browser # Fix: N/A ################################################################### #################### - Description: #################### Pluck is a content management system, written in php. #################### - Vulnerability: #################### +--> Local File Inclusion Input passed to multiple parameters in "predefined_variables.php" are not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources. Code Snippet: /data/inc/themes/predefined_variables.php #line:15-38 //Include Translation data include ("data/settings/langpref.php"); include ("data/inc/lang/$langpref"); //Get Site-title $sitetitle = file_get_contents("data/settings/title.dat"); //Get the page-data $filetoread = $_GET['file']; $album = $_GET['album']; $blogpost = $_GET['blogpost']; $cat = $_GET['cat']; if (($filetoread) && (file_exists("data/content/$filetoread"))) { include "data/content/$filetoread"; } elseif ($album) { $title = $album; } elseif ($blogpost) { include("data/blog/$cat/posts/$blogpost"); } elseif ((!file_exists("data/content/$filetoread")) && (!$album) && (!$blogpost)) { $title = $lang_front1; $content = $lang_front2; } POC: http://localhost/pluck-4_5_1/data/inc/themes/predefined_variables.php?blogpost=../../../../../../../../boot.ini #################### - Credit : #################### AmnPardaz Security Research Team Contact: admin[4t}bugreport{d0t]ir www.BugReport.ir www.AmnPardaz.comz

Referencje:

http://xforce.iss.net/xforce/xfdb/43741
http://www.securityfocus.com/bid/30218
http://www.milw0rm.com/exploits/6074
http://www.frsirt.com/english/advisories/2008/2104/references
http://secunia.com/advisories/31088


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top