vendor:
Verlihub Control Panel
by:
Methodman
N/A
CVSS
HIGH
Local File Inclusion
CWE
Product Name: Verlihub Control Panel
Affected Version From: 1.7
Affected Version To: 1.7
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2007
Verlihub Control Panel v 1.7 PHP 4.x Local File Inclusion
The Verlihub Control Panel version 1.7 for PHP 4.x is vulnerable to Local File Inclusion. The vulnerability exists due to the lack of proper input validation in the 'page' parameter of the URL. An attacker can exploit this vulnerability by manipulating the 'page' parameter to include arbitrary local files, such as '/etc/passwd'. This can lead to unauthorized access to sensitive information on the server.
Mitigation:
To mitigate this vulnerability, it is recommended to upgrade to a newer version of the Verlihub Control Panel that has addressed this issue. Additionally, ensure that the 'magic_quotes_gpc' setting is set to 'Off' and the 'ini_set' function is disabled in the PHP configuration.