vendor:
Rips Scanner
by:
Ashiyane Digital Security Team
9,3
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: Rips Scanner
Affected Version From: 0.5
Affected Version To: 0.5
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2015
Rips Scanner 0.5 – (code.php) Local File Inclusion
Rips Scanner 0.5 is vulnerable to Local File Inclusion. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'file' parameter of the 'code.php' script. An attacker can exploit this vulnerability to include arbitrary files from the web server and execute arbitrary code in the context of the web server process. The attacker can also include and execute arbitrary local files on the web server.
Mitigation:
Input validation should be used to prevent the exploitation of this vulnerability. All user-supplied input should be validated and filtered before being used in the application.