vendor:
Jorp
by:
Juan Galiana Lara
7,5
CVSS
HIGH
Remote File Include
94
CWE
Product Name: Jorp
Affected Version From: 1.3.05.09
Affected Version To: 1.3.05.09
Patch Exists: YES
Related CWE: CVE-2005-2090
CPE: a:jorp_team:jorp
Metasploit:
https://www.rapid7.com/db/vulnerabilities/sunpatch-151598/, https://www.rapid7.com/db/vulnerabilities/sunpatch-151597/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2013-4286/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2013-4286/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2013-4286/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2013-4286/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2013-4286/, https://www.rapid7.com/db/vulnerabilities/apache-tomcat-cve-2013-4286/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2013-4286/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0602/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0261/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2007-0327/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0328/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-1069/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0360/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0327/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0326/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0340/, https://www.rapid7.com/db/vulnerabilities/apache-tomcat-cve-2005-2090/, https://www.rapid7.com/db/vulnerabilities/apple-osx-tomcat-cve-2005-2090/, https://www.rapid7.com/db/?q=CVE-2005-2090&type=&page=2, https://www.rapid7.com/db/?q=CVE-2005-2090&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: PHP
2005
GET vars ‘x’ & ‘y’ ADMIN FUNCTION EXECUTION
Jorp is vulnerable to a remote file include vulnerability. This vulnerability is caused due to the use of user-supplied input without proper validation. This can be exploited to execute arbitrary PHP code by including files from remote resources. Successful exploitation of this vulnerability requires that 'register_globals' is set to 'on' and that the vulnerable script is directly requested with the malicious URL. The vulnerable code is located in the 'index.php' script. The following example URL is available: http://[target]/[path]/index.php?x=[malicious_code]&y=1. The malicious code will be executed by the vulnerable script.
Mitigation:
Validate user-supplied input and set 'register_globals' to 'off'.