header-logo
Suggest Exploit
vendor:
Live Help
by:
SecurityFocus
6,4
CVSS
MEDIUM
Remote File-Include and Path-Disclosure
94
CWE
Product Name: Live Help
Affected Version From: 2.x
Affected Version To: 3.x
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2012

Crafty Syntax Live Help Remote File-Include and Path-Disclosure Vulnerabilities

Crafty Syntax Live Help is prone to a remote file-include vulnerability and a path-disclosure vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting these issues could allow an attacker to obtain sensitive information and compromise the application and the underlying system; other attacks are also possible. File-include: http://www.example.com/path/admin.php?page=[RFI] Path-disclosure: http://www.example.com/livehelp/xmlhttp.php

Mitigation:

Input validation should be used to ensure that untrusted data is not included in the application's response. Additionally, the application should be configured to use the least-privileged account with the fewest possible permissions.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/59322/info

Crafty Syntax Live Help is prone to a remote file-include vulnerability and a path-disclosure vulnerability because it fails to sufficiently sanitize user-supplied input.

Exploiting these issues could allow an attacker to obtain sensitive information and compromise the application and the underlying system; other attacks are also possible.

Crafty Syntax Live Help versions 2.x and versions 3.x are vulnerable. 

File-include:

http://www.example.com/path/admin.php?page=[RFI]

Path-disclosure:

http://www.example.com/livehelp/xmlhttp.php