vendor:
StrawBerry
by:
[AVT]
9,3
CVSS
HIGH
Local File Inclusion (LFI) and Remote Command Execution (RCE)
94
CWE
Product Name: StrawBerry
Affected Version From: 1.1.1
Affected Version To: 1.1.1
Patch Exists: NO
Related CWE: N/A
CPE: strawberry:strawberry:1.1.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
StrawBerry 1.1.1 LFI / Remote Command Execution Exploit
This exploit is used to gain access to the StrawBerry 1.1.1 web application. It is a combination of Local File Inclusion (LFI) and Remote Command Execution (RCE). The exploit is triggered by sending a POST request to the vulnerable application with malicious code in the comment field. This code is then executed by the application, allowing the attacker to gain access to the application.
Mitigation:
The best way to mitigate this vulnerability is to ensure that the application is not vulnerable to LFI and RCE attacks. This can be done by properly validating user input and using secure coding practices.