Exploit LoudBlog 0.41 - 'index.php?template' Traversal Arbitrary File Access

Exploiter

Хакер
34,599
0
18 Дек 2022
EDB-ID
27369
Проверка EDB
  1. Пройдено
Автор
TZITAROTH
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2006-1114
Дата публикации
2006-03-07
Код:
source: https://www.securityfocus.com/bid/17023/info
 
Loudblog is prone to multiple input-validation vulnerabilities:
 
- An SQL-injection vulnerability.
- Two local file-include vulnerabilities.
- An information-disclosure vulnerability.
 
These issues allow remote attackers to execute arbitrary PHP script code in the context of the hosting webserver, gain administrative privileges in the web application, and gain access to potentially sensitive information.
 
The SQL-injection vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks. Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
 
Other attacks may also be possible.
 
Loudblog version 0.41 is vulnerable to these issues; other versions may also be affected.

http://www.example.com/loudblog/index.php?template=../../../loudblog/custom/config.php%00
http://www.example.com/loudblog/loudblog/index.php?page=/../../../audio/cmdphp.mp3%00
 
Источник
www.exploit-db.com

Похожие темы