vendor:
Ruubikcms
by:
Sangyun YOO
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: Ruubikcms
Affected Version From: 1.1.2000
Affected Version To: 1.1.2000
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 Starter K
2011
Ruubikcms v 1.1.0 (/extra/image.php) Local File Inclusion Vulnerability
Ruubikcms v 1.1.0 is vulnerable to a Local File Inclusion vulnerability due to a lack of proper sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious file path in the 'f' parameter of the '/extra/image.php' script. This will allow the attacker to read any file on the server.
Mitigation:
Input validation should be used to ensure that user-supplied input is properly sanitized. Additionally, access to the '/extra/image.php' script should be restricted to trusted users.