ID 1337DAY-ID-9636
Type zdt
Reporter 0day Today Team
Modified 2010-03-14T00:00:00
Description
Exploit for unknown platform in category web applications
=====================================================
PHP-Fusion-AP-7.00.2-Rus (search.php) disclosure ways
=====================================================
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1
#[+] Discovered By : Inj3ct0r
#[+] Site : Inj3ct0r.com
#[+] support e-mail : submit[at]inj3ct0r.com
Site: www.alipapa.com.ua
Product: PHP-Fusion
Version: PHP-Fusion-AP-7.00.2-Rus
Disclosure ways. Error in file search.php
PHP code:
if (isset($_GET['stext']))
{
if (is_array($_GET['stext']))
{
redirect(FUSION_SELF);
}
else
{
$_GET['stext'] = urlencode(stripinput($_GET['stext']));
}
}
else
{
$_GET['stext'] = "";
}
Example:
http://alipapa.com.ua/search.php?stext []
# 0day.today [2018-01-30] #
{"published": "2010-03-14T00:00:00", "id": "1337DAY-ID-9636", "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Exploit for unknown platform in category web applications", "enchantments": {"score": {"value": -0.2, "vector": "NONE", "modified": "2018-01-30T10:59:19", "rev": 2}, "dependencies": {"references": [], "modified": "2018-01-30T10:59:19", "rev": 2}, "vulnersScore": -0.2}, "type": "zdt", "lastseen": "2018-01-30T10:59:19", "edition": 2, "title": "PHP-Fusion-AP-7.00.2-Rus (search.php) disclosure ways", "href": "https://0day.today/exploit/description/9636", "modified": "2010-03-14T00:00:00", "bulletinFamily": "exploit", "viewCount": 3, "cvelist": [], "sourceHref": "https://0day.today/exploit/9636", "references": [], "reporter": "0day Today Team", "sourceData": "=====================================================\r\nPHP-Fusion-AP-7.00.2-Rus (search.php) disclosure ways\r\n=====================================================\r\n\r\n1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 \r\n0 _ __ __ __ 1\r\n1 /' \\ __ /'__`\\ /\\ \\__ /'__`\\ 0\r\n0 /\\_, \\ ___ /\\_\\/\\_\\ \\ \\ ___\\ \\ ,_\\/\\ \\/\\ \\ _ ___ 1\r\n1 \\/_/\\ \\ /' _ `\\ \\/\\ \\/_/_\\_<_ /'___\\ \\ \\/\\ \\ \\ \\ \\/\\`'__\\ 0\r\n0 \\ \\ \\/\\ \\/\\ \\ \\ \\ \\/\\ \\ \\ \\/\\ \\__/\\ \\ \\_\\ \\ \\_\\ \\ \\ \\/ 1\r\n1 \\ \\_\\ \\_\\ \\_\\_\\ \\ \\ \\____/\\ \\____\\\\ \\__\\\\ \\____/\\ \\_\\ 0\r\n0 \\/_/\\/_/\\/_/\\ \\_\\ \\/___/ \\/____/ \\/__/ \\/___/ \\/_/ 1\r\n1 \\ \\____/ >> Exploit database separated by exploit 0\r\n0 \\/___/ type (local, remote, DoS, etc.) 1\r\n1 0\r\n-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1\r\n\r\n#[+] Discovered By : Inj3ct0r\r\n#[+] Site : Inj3ct0r.com\r\n#[+] support e-mail : submit[at]inj3ct0r.com\r\n\r\n\r\nSite: www.alipapa.com.ua\r\nProduct: PHP-Fusion\r\nVersion: PHP-Fusion-AP-7.00.2-Rus\r\n\r\nDisclosure ways. Error in file search.php\r\n\r\nPHP code:\r\n\r\n if (isset($_GET['stext'])) \r\n{ \r\n if (is_array($_GET['stext'])) \r\n { \r\n redirect(FUSION_SELF); \r\n } \r\n else \r\n { \r\n $_GET['stext'] = urlencode(stripinput($_GET['stext'])); \r\n } \r\n} \r\nelse \r\n{ \r\n $_GET['stext'] = \"\"; \r\n} \r\n\r\n\r\nExample:\r\n\r\nhttp://alipapa.com.ua/search.php?stext []\r\n\r\n\r\n\n# 0day.today [2018-01-30] #", "immutableFields": []}
{}