vendor:
playsms
by:
ahmadbady
7.5
CVSS
HIGH
Remote File Inclusion/Local File Inclusion
94
CWE
Product Name: playsms
Affected Version From: playsms 0.9.3
Affected Version To: playsms 0.9.3
Patch Exists: YES
Related CWE: N/A
CPE: a:playsms:playsms:0.9.3
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
RFI/LFI
playsms 0.9.3 is vulnerable to Remote File Inclusion/Local File Inclusion. The vulnerability is due to the application including files without proper sanitization of user supplied input. This can be exploited to include arbitrary files from remote and local resources by manipulating the 'apps_path[plug]', 'gateway_module', 'apps_path[themes]', 'themes_module' and 'apps_path[libs]' parameters in the 'plugin/gateway/gnokii/init.php', 'plugin/themes/default/init.php' and 'lib/function.php' scripts.
Mitigation:
Input validation should be used to prevent Remote File Inclusion/Local File Inclusion attacks.