Philex Remote And Local File Include Vulnerabilities
BID:23111
Info
Philex Remote And Local File Include Vulnerabilities
| Bugtraq ID: | 23111 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1698 CVE-2007-1697 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 23 2007 12:00AM |
| Updated: | Jul 06 2016 02:39PM |
| Credit: | GloD_M disclosed these vulnerabilities. |
| Vulnerable: |
Philex Philex 0.2.3 |
| Not Vulnerable: | |
Discussion
Philex Remote And Local File Include Vulnerabilities
Philex is prone to remote and local file-include vulnerabilities because it fails to sufficiently sanitize user-supplied input.
An attacker can exploit these issues to execute arbitrary local and remote PHP code in the context of the webserver process. This may facilitate a remote compromise of the underlying system; other attacks are also possible.
Philex 0.2.3 is vulnerable; other versions may also be affected.
Philex is prone to remote and local file-include vulnerabilities because it fails to sufficiently sanitize user-supplied input.
An attacker can exploit these issues to execute arbitrary local and remote PHP code in the context of the webserver process. This may facilitate a remote compromise of the underlying system; other attacks are also possible.
Philex 0.2.3 is vulnerable; other versions may also be affected.
Exploit / POC
Philex Remote And Local File Include Vulnerabilities
Attackers can use a browser to exploit these issues.
The following proof-of-concept URIs are available:
http://www.example.com/[Path_Philex]/header.inc.php?CssFile=Shell
http://www.example.com/[Path_Philex]/download.php?file=conf.inc.php
Attackers can use a browser to exploit these issues.
The following proof-of-concept URIs are available:
http://www.example.com/[Path_Philex]/header.inc.php?CssFile=Shell
http://www.example.com/[Path_Philex]/download.php?file=conf.inc.php
Solution / Fix
Philex Remote And Local File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].