PHPMyTourney Remote file include Vulnerability

2008.03.04
Credit: HACKERS PAL
Risk: High
Local: No
Remote: Yes
CWE: CWE-94


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Hello PHPMyTourney Remote file include Vulnerability Discovered By : HACKERS PAL Copy rights : HACKERS PAL Website : http://www.soqor.net Email Address : security (at) soqor (dot) net [email concealed] home page : http://phpmytourney.sourceforge.net Script : PHPMyTourney vulnerable file : phpmytourney/sources/tourney/index.php code $page = $_GET['page']; if(isset($page)) include($page . '.php'); else echo("must specify a page "); lines 45-49 fast solution replace with if(file_exists($page . '.php') and !eregi(".",$page) and !eregi(":",$page) and !eregi("/",$page)) { include($page . '.php'); } else { echo("must specify a page "); } phpmytourney/sources/tourney/index.php?page=[Evil-Script] #WwW.SoQoR.NeT


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top