header-logo
Suggest Exploit
vendor:
Kemana Directory
by:
Gjoko 'LiquidWorm' Krstic
7,5
CVSS
HIGH
Local File Inclusion Vulnerability
22
CWE
Product Name: Kemana Directory
Affected Version From: 1.5.6
Affected Version To: 1.5.6
Patch Exists: YES
Related CWE: N/A
CPE: a:c97net:kemana:1.5.6
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Apache/2.4.7 (Win32), PHP/5.5.6, MySQL 5.6.14
2014

Kemana Directory 1.5.6 (run param) Local File Inclusion Vulnerability

Kemana suffers from an authenticated file inclusion vulnerability (LFI) when input passed thru the 'run' parameter to task.php is not properly verified before being used to include files. This can be exploited to include files from local resources with directory traversal attacks.

Mitigation:

Input validation should be used to prevent directory traversal attacks.
Source

Exploit-DB raw data:


Kemana Directory 1.5.6 (run param) Local File Inclusion Vulnerability


Vendor: C97net
Product web page: http://www.c97.net
Affected version: 1.5.6

Summary: Experience the ultimate directory script solution
with Kemana. Create your own Yahoo or Dmoz easily with Kemana.
Unique Kemana's features including: CMS engine based on our
qEngine, multiple directories support, user friendly administration
control panel, easy to use custom fields, unsurpassed flexibility.

Desc: Kemana suffers from an authenticated file inclusion vulnerability
(LFI) when input passed thru the 'run' parameter to task.php is
not properly verified before being used to include files. This can
be exploited to include files from local resources with directory
traversal attacks.


Tested on: Apache/2.4.7 (Win32)
           PHP/5.5.6
           MySQL 5.6.14


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2014-5177
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5177.php


Dork #1: intitle:powered by c97.net
Dork #2: intitle:powered by qEngine
Dork #3: intitle:powered by Kemana.c97.net
Dork #4: intitle:powered by Cart2.c97.net



07.03.2014

---


http://localhost/kemana/admin/task.php?run=../../../../../../windows/win.ini