phpKF-Portal Multiple Local File Include Vulnerabilities
BID:30566
Info
phpKF-Portal Multiple Local File Include Vulnerabilities
| Bugtraq ID: | 30566 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-6516 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 06 2008 12:00AM |
| Updated: | May 07 2015 05:25PM |
| Credit: | KnocKout |
| Vulnerable: |
phpKF phpKF-Portal 1.10 |
| Not Vulnerable: | |
Discussion
phpKF-Portal Multiple Local File Include Vulnerabilities
phpKF-Portal is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability using directory-traversal strings to view local files within the context of the webserver process. Information harvested may aid in further attacks.
phpKF-Portal 1.10 is vulnerable; other versions may also be affected.
phpKF-Portal is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability using directory-traversal strings to view local files within the context of the webserver process. Information harvested may aid in further attacks.
phpKF-Portal 1.10 is vulnerable; other versions may also be affected.
Exploit / POC
phpKF-Portal Multiple Local File Include Vulnerabilities
Attackers can exploit these issues via a browser.
The following example URIs are available:
http://www.example.com/path/baslik.php?tema_dizin=../%00LocalFile]
http://www.example.com/path/anket_yonetim.php?portal_ayarlarportal_dili=../%00LocalFile]
Attackers can exploit these issues via a browser.
The following example URIs are available:
http://www.example.com/path/baslik.php?tema_dizin=../%00LocalFile]
http://www.example.com/path/anket_yonetim.php?portal_ayarlarportal_dili=../%00LocalFile]
Solution / Fix
phpKF-Portal Multiple Local File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].