vendor:
Simple PHP Blog
by:
Maxza
9.3
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: Simple PHP Blog
Affected Version From: 0.5.0
Affected Version To: 0.5.0
Patch Exists: YES
Related CWE: N/A
CPE: a:simple_php_blog:simple_php_blog:0.5.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
sIMPLE php bLOG 0.5.0 eXPLOIT
This exploit allows an attacker to execute arbitrary code on a vulnerable sIMPLE php bLOG 0.5.0 installation. The attacker can send a malicious POST request to the login_cgi.php page with a valid username and password. This will set a cookie which can then be used to send a malicious POST request to the images/emoticons/sphp.php page. This will create a new file called sphp.php which contains the attacker's code. The attacker can then send a POST request to the sphp.php page with their code, which will be executed on the vulnerable server.
Mitigation:
The best way to mitigate this vulnerability is to upgrade to the latest version of sIMPLE php bLOG. Additionally, administrators should ensure that all users have strong passwords and that the server is properly configured to prevent unauthorized access.