Kemana Directory 1.5.6 Local File Inclusion Vulnerability

ID 1337DAY-ID-22068
Type zdt
Reporter LiquidWorm
Modified 2014-03-26T00:00:00


Kemana Directory version 1.5.6 suffers from a local file inclusion vulnerability.

                                            Kemana Directory 1.5.6 (run param) Local File Inclusion Vulnerability

Vendor: C97net
Product web page:
Affected version: 1.5.6

Summary: Experience the ultimate directory script solution
with Kemana. Create your own Yahoo or Dmoz easily with Kemana.
Unique Kemana's features including: CMS engine based on our
qEngine, multiple directories support, user friendly administration
control panel, easy to use custom fields, unsurpassed flexibility.

Desc: Kemana suffers from an authenticated file inclusion vulnerability
(LFI) when input passed thru the 'run' parameter to task.php is
not properly verified before being used to include files. This can
be exploited to include files from local resources with directory
traversal attacks.

Tested on: Apache/2.4.7 (Win32)
           MySQL 5.6.14

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic

Advisory ID: ZSL-2014-5177
Advisory URL:

Dork #1: intitle:powered by
Dork #2: intitle:powered by qEngine
Dork #3: intitle:powered by
Dork #4: intitle:powered by




# [2018-03-01]  #