Lucene search

K
htbridgeHigh-Tech BridgeHTB23086
HistoryApr 11, 2012 - 12:00 a.m.

Local File Inclusion in PluXml

2012-04-1100:00:00
High-Tech Bridge
www.htbridge.com
19

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.062 Low

EPSS

Percentile

92.8%

High-Tech Bridge SA Security Research Lab has discovered vulnerabiliy in PluXml, which can be exploited to perform Local File Inclusion attacks.

  1. Local File Inclusion in PluXml
    1.1 Input passed via the “default_lang” POST parameter to /update/index.php is not properly verified before being used in include_once() function and can be exploited to include arbitrary local files.
    This can be exploited to include local files via directory traversal sequences and URL-encoded NULL bytes.
    The following PoC (Proof of Concept) demonstrates the vulnerability:
    POST /update/index.php HTTP/1.1
    […]
    Content-Type: application/x-www-form-urlencoded
    Content-Length: […]

default_lang=…%2F…%2F…%2F…%2F…%2F…%2F…%2Fetc%2Fpasswd%00

CPENameOperatorVersion
pluxmlle5.1.5

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.062 Low

EPSS

Percentile

92.8%