PHPizabi 'id' Parameter Local File Include Vulnerability
BID:30707
Info
PHPizabi 'id' Parameter Local File Include Vulnerability
| Bugtraq ID: | 30707 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-3723 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 15 2008 12:00AM |
| Updated: | Apr 16 2015 05:55PM |
| Credit: | Lostmon |
| Vulnerable: |
PHPizabi PHPizabi 0.848b C1 HP3 |
| Not Vulnerable: | |
Discussion
PHPizabi 'id' Parameter Local File Include Vulnerability
PHPizabi is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability using directory-traversal strings to view local files within the context of the webserver process. Information harvested may aid in further attacks.
PHPizabi 0.848b C1 HFP3 is vulnerable; other versions may also be affected.
PHPizabi is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability using directory-traversal strings to view local files within the context of the webserver process. Information harvested may aid in further attacks.
PHPizabi 0.848b C1 HFP3 is vulnerable; other versions may also be affected.
Exploit / POC
PHPizabi 'id' Parameter Local File Include Vulnerability
Attackers can exploit this issue via a browser.
The following example URI is available:
http://www.example.com/phpizabi/index.php?L=admin.templates.edittemplate&id=../../../boot.ini
Attackers can exploit this issue via a browser.
The following example URI is available:
http://www.example.com/phpizabi/index.php?L=admin.templates.edittemplate&id=../../../boot.ini
Solution / Fix
PHPizabi 'id' Parameter Local File Include Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].