Shoutpro 1.0 Version - Remote File Include Vulnerability

2007.03.01
Risk: High
Local: No
Remote: Yes
CWE: CWE-264


Ogólna skala CVSS: 5/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

# if ($path){ # $ips = file("$path/lists/bannedips.php"); # } else { # $ips = file("lists/bannedips.php"); # } # if (in_array($REMOTE_ADDR,$ips)) { # echo($bannedmessage); # die; There might be a terminology problem here. I don't see how this can be used to execute code. Yes, the file() call could be used to access a file that the attacker can control, but the only use of the $ips array is in checking for banned addresses. The use of file() is not the same as include() or require(). So - attackers could use this to bypass a ban against their IP address because they can control the ban file, but that's not the same as "inclusion." - Steve


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top