vendor:
Simple PHP Newsletter
by:
ahmadbady
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: Simple PHP Newsletter
Affected Version From: 1.5
Affected Version To: 1.5
Patch Exists: NO
Related CWE: CVE not provided
CPE: a:simple_php_newsletter:simple_php_newsletter:1.5
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2023-22024/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-20212/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2022-24834/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-27395/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-22325/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-3326/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/apple-osx-cups-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-1825/, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=2, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=3, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=4, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=2
Platforms Tested:
2009
Simple PHP Newsletter 1.5 Local File Include Vulnerability
The Simple PHP Newsletter 1.5 script is vulnerable to local file inclusion. The vulnerability exists in the 'mail.php' and 'mailbar.php' files, where the 'olang' parameter is not properly sanitized before being used in a require statement, allowing an attacker to include arbitrary local files. By manipulating the 'olang' parameter, an attacker can include sensitive files, such as the '/etc/passwd' file, which may contain hashed passwords and other system information.
Mitigation:
To mitigate this vulnerability, ensure that user-supplied input is properly sanitized and validated before being used in file inclusion statements. Additionally, it is recommended to restrict file inclusion to a whitelist of allowed files or directories.