vendor:
RaidenHTTPD
by:
rgod
8,8
CVSS
HIGH
Remote Command Execution
20
CWE
Product Name: RaidenHTTPD
Affected Version From: 1.1.49
Affected Version To: 1.1.49
Patch Exists: YES
Related CWE: N/A
CPE: a:raidenftpd:raidenftpd:1.1.49
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2007
RaidenHTTPD/1.1.49 remote commands execution exploit
RaidenHTTPD is a web server software for Windows 98 / Me / 2000 / XP / 2003 platforms. It carries a PHP interpreter (4.4.1 version) and an administrative interface in /raidenhttpd-admin folder. However, unauthorized access to some scripts in /raidenhttpd-admin/slice folder is possible due to an uninitialized variable in check.php at line 35. Additionally, register_globals and allow_url_fopen are enabled by default.
Mitigation:
Disable register_globals and allow_url_fopen, and ensure that all variables are initialized.