[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201104072035.p37KZAXO002188@www3.securityfocus.com>
Date: Thu, 7 Apr 2011 14:35:10 -0600
From: by_argos@...mail.com
To: bugtraq@...urityfocus.com
Subject: LFI Vulnerability in 024cms Admin Control Panel v1.1.0 Beta
(Complete-Modules Package)
=============================================================================================================
1024cms Admin Control Panel v1.1.0 Beta (Complete-Modules Package) - Local File Include Vulnerability
=============================================================================================================
Software: 1024cms Admin Control Panel v1.1.0 Beta (complete-modules package)
Vendor: http://1024cms.org/
Vuln Type: Local File Include
Remote: Yes
Local: No
Discovered by: QSecure and Demetris Papapetrou
Website: http://www.qsecure.com.cy
Discovered: 15/03/2011
Reported: 29/03/2001
Disclosed:
VULNERABILITY DESCRIPTION:
==========================
The scripts "/includes/base_files.php" and "/dashboard.php" are prone to a local file-include vulnerability because they fail to properly sanitize user-supplied input in the "act" parameter.
An attacker can exploit this vulnerability to obtain potentially sensitive information and execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the underlying computer; other attacks are also possible.
PoC Exploit:
============
/index.php?act=../../../../../../etc/passwd%00
/dashboard.php?act=../../../../../../../etc/passwd%00
Powered by blists - more mailing lists