header-logo
Suggest Exploit
vendor:
AdVancedClanscript
by:
xdh
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: AdVancedClanscript
Affected Version From: AdVancedClanscript < 3.4
Affected Version To: AdVancedClanscript < 3.4
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

AdVancedClanscript Remote File Inclusion Vulnerability

AdVancedClanscript version 3.4 and below is vulnerable to a Remote File Inclusion vulnerability. This vulnerability is due to a failure in the application to properly sanitize user-supplied input to the 'content' parameter of the 'mcf.php' script. This may allow a remote attacker to include a file from a remote host that contains arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access.

Mitigation:

Input validation should be used to ensure that untrusted input is rejected. Additionally, the application should be configured to use a minimal privilege account to access the web server.
Source

Exploit-DB raw data:

*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*              .___.__     
*   ___  ___ __| _/|  |__  
*   \  \/  // __ | |  |  \
*    >    </ /_/ | |   Y  \
*   /__/\_ \____ | |___|  /
*         \/    \/      \/  discovered by xdh
*
*
*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*    {Critical Level}: Dangerous   
*    {Class}: Remote File Inclusion                                           
*    {Venedor site}: http://avc.x.philipwette.de/     
*    {Version}: AdVancedClanscript < 3.4       
*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*
* VUln:
* Filename: mcf.php
* Line: 70:include("$content");
*        
*    usage: http://www.test.com/path/mcf.php?content=xpl
*
*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*    greetz ² morgan, nethug-47, r00t, tz4r, x2k,
*         jack, id and many others  
*          /server -m irc.root.net.ve -j #morgan
*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

# milw0rm.com [2006-09-24]