vendor:
1024 CMS
by:
Sangyun YOO
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: 1024 CMS
Affected Version From: 1024 CMS Version 1.1.0 beta
Affected Version To: 1024 CMS Version 1.1.0 beta
Patch Exists: NO
Related CWE: N/A
CPE: 1024cms:1024_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 Starter K
2011
1024 CMS Version 1.1.0 beta(/complete-modules/modules/forcedownload/force_download.php) Local File Inclusion Vulnerability
1024 CMS Version 1.1.0 beta is vulnerable to a Local File Inclusion vulnerability due to a lack of proper sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious filename parameter to the vulnerable application. This can allow an attacker to read sensitive files from the server, such as the boot.ini file.
Mitigation:
Input validation should be used to ensure that user-supplied input is properly sanitized. Additionally, access to sensitive files should be restricted to only authorized users.