header-logo
Suggest Exploit
vendor:
CitrusDB
by:
SecurityFocus
7.5
CVSS
HIGH
Local File Include
98
CWE
Product Name: CitrusDB
Affected Version From: 2000.3.6
Affected Version To: 2000.3.6
Patch Exists: NO
Related CWE: N/A
CPE: citrusdb
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

CitrusDB Local File Include Vulnerability

CitrusDB is reportedly affected by a vulnerability that permits the inclusion of any local PHP file. This issue is due to the application failing to properly sanitize user-supplied input. This issue may also allow remote file includes, although this has not been confirmed.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12564/info

CitrusDB is reportedly affected by a vulnerability that permits the inclusion of any local PHP file. This issue is due to the application failing to properly sanitize user-supplied input.

This issue is reported to affect CitrusDB 0.3.6; earlier versions may also be affected.

This issue may also allow remote file includes, although this has not been confirmed. 

http://www.example.com/citrusdb/tools/index.php?load=../../../../../../tmp/exploit.php