vendor:
Fantastic News
by:
SHiKaA
N/A
CVSS
N/A
Remote File Inclusion
94
CWE
Product Name: Fantastic News
Affected Version From: 2.1.2
Affected Version To: 2.1.3
Patch Exists: YES
Related CWE: N/A
CPE: a:fscripts:fantastic_news
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
Fantastic News <= v2.1.3 (CONFIG[script_path]) Remote File Inclusion Exploit
Fantastic News versions 2.1.2 and 2.1.3 are vulnerable to a Remote File Inclusion vulnerability due to a lack of proper sanitization of user-supplied input to the CONFIG[script_path] parameter in the news.php script. An attacker can exploit this vulnerability by sending a malicious URL in the CONFIG[script_path] parameter, which will be executed on the vulnerable server.
Mitigation:
Input validation should be used to prevent the exploitation of this vulnerability.