vendor:
mxBB
by:
Dr Max Virus
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: mxBB
Affected Version From: 1.5
Affected Version To: 1.5
Patch Exists: YES
Related CWE: N/A
CPE: a:mx-system:mxbb
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows
2008
mxBB newssuite Module v1.5 –Remote File Inclusion Exploit
This exploit allows an attacker to execute arbitrary code on the vulnerable server by including a remote file. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'mx_root_path' parameter in the 'includes/newssuite_constants.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the 'mx_root_path' parameter.
Mitigation:
Input validation should be used to ensure that user-supplied input is properly sanitized before being used in the application. Additionally, the application should be configured to use the least privileged account with the least amount of privileges necessary.