vendor:
Bubla
by:
DeltasecurityTEAM
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Bubla
Affected Version From: 1.0.0rc1
Affected Version To: 1.0.0rc2
Patch Exists: NO
Related CWE: N/A
CPE: a:bubla:bubla:1.0.0rc2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
Bubla <= 1.0.0rc2 Remote File Inclusion
A remote file inclusion vulnerability exists in Bubla <= 1.0.0rc2. The vulnerability is due to the 'bu_dir' and 'bu_config[dir]' parameters in the 'process.php' script not properly sanitized before being used in a 'require_once' function call. This can be exploited to include arbitrary remote files by e.g. passing a URL in the 'bu_dir' or 'bu_config[dir]' parameter.
Mitigation:
Input validation should be used to ensure that untrusted input is rejected. Additionally, the application should be configured to use a safe include path.