vendor:
Vortex Blog AKA vBlog
by:
Dr.Pantagon
8,8
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Vortex Blog AKA vBlog
Affected Version From: Vortex Blog AKA vBlog a0.1
Affected Version To: Vortex Blog AKA vBlog a0.1
Patch Exists: NO
Related CWE: N/A
CPE: a:vortexblog:vortex_blog_aka_vblog
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
Vortex Blog AKA vBlog Remote File Inclusion Vulnerability
Vortex Blog AKA vBlog is prone to a remote file inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
Mitigation:
Input validation should be used to ensure that user-supplied input is properly sanitized. Additionally, it is recommended to restrict access to the vulnerable file.