PRADO PHP Framework 3.2.0 - Arbitrary File Read Vulnerability

EDB-ID: 22937 CVE: N/A OSVDB-ID: 87873...
Verified: Author: LiquidWorm Published: 2012-11-26
Download Exploit: Source Raw Download Vulnerable App:
PRADO PHP Framework 3.2.0 Arbitrary File Read Vulnerability

Vendor: Prado Software
Product web page:
Affected version: 3.2.0 (r3169)

Summary: PRADO is a component-based and event-driven programming
framework for developing Web applications in PHP 5. PRADO stands
for PHP Rapid Application Development Object-oriented.

Desc: Input passed to the 'sr' parameter in 'functional_tests.php'
is not properly sanitised before being used to get the contents of
a resource. This can be exploited to read arbitrary data from local
resources with directory traversal attack.


 3: $TEST_TOOLS = dirname(__FILE__);
 5: if(isset($_GET['sr']))
 6: {
 8:     if(($selenium_resource=realpath($TEST_TOOLS.'/selenium/'.$_GET['sr']))!==false)
 9:         echo file_get_contents($selenium_resource);
10: exit;
11: }


Tested on: Microsoft Windows 7 Ultimate SP1 (EN)
           Apache 2.4.2 (Win32)
           PHP 5.4.4
           MySQL 5.5.25a

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic

Advisory ID: ZSL-2012-5113
Advisory URL: