source: https://www.securityfocus.com/bid/49525/info
Pluck is prone to multiple file-include and a file-disclosure vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit the local file-include vulnerabilities using directory-traversal strings to view and execute local files within the context of the webserver process. Information harvested may aid in further attacks.
An attacker can exploit local file-disclosure vulnerability to obtain potentially sensitive information from local files on computers running the vulnerable application. This may aid in further attacks.
Pluck 4.7 is vulnerable; other versions may also be affected.
1-File Inclusion:
include(ALBUMS_DIR.'/'.$_GET['album'].'.php');
Require:
if (file_exists(ALBUMS_DIR.'/'.$_GET['album'].'.php')) {
function albums_pages_site() {
2-File Inclusion
include (ALBUMS_DIR.'/'.$album['seoname'].'.php');
foreach ($albums as $album) {
$albums = albums_get_albums();
3-File Disclosure
echo readfile('../../settings/modules/albums/'.$image);
$image = $_GET['image'];
requires:
if (file_exists('../../settings/modules/albums/'.$image)) {