Dalai Forum Forumreply.PHP Local File Include Vulnerability
BID:25361
Info
Dalai Forum Forumreply.PHP Local File Include Vulnerability
| Bugtraq ID: | 25361 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-4457 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 20 2007 12:00AM |
| Updated: | May 07 2015 05:35PM |
| Credit: | Darkdewil[system-errrror] is credited with the discovery of this vulnerability. |
| Vulnerable: |
Florian Mahieu Dalai Forum 1.1 |
| Not Vulnerable: | |
Discussion
Dalai Forum Forumreply.PHP Local File Include Vulnerability
Dalai Forum is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
Exploiting this issue may allow an unauthorized user to view files and execute local scripts.
Dalai Forum is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
Exploiting this issue may allow an unauthorized user to view files and execute local scripts.
Exploit / POC
Dalai Forum Forumreply.PHP Local File Include Vulnerability
Attackers may exploit this issue through a browser.
The following proof of concept has been provided:
http://www.example.com/forum/forumreply.php?chemin=../../../../etc/passwd
Attackers may exploit this issue through a browser.
The following proof of concept has been provided:
http://www.example.com/forum/forumreply.php?chemin=../../../../etc/passwd
Solution / Fix
Dalai Forum Forumreply.PHP Local File Include Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Dalai Forum Forumreply.PHP Local File Include Vulnerability
References:
References:
- Dalai Forum Homepage (Florian Mahieu)
- Dalai Forum Remote File Inclusion Exploit ([email protected])