vendor:
Arcadem
by:
David Sopas Ferreira
7.5
CVSS
HIGH
Remote File Inclusion, SQL Injection
CWE
Product Name: Arcadem
Affected Version From: Arcadem 2.01
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2007
Arcadem Remote File Inclusion Flaw / SQL Injection
It is possible for a remote attacker to include a file from local or remote resources and/or execute arbitrary script code with the privileges of the webserver. An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your database and/or expose sensitive information.
Mitigation:
Edit the source code to ensure that input is properly validated. Where is possible, it is recommended to make a list of accepted filenames and restrict the input to that list. For PHP, the option allow_url_fopen would normally allow a programmer to open, include or otherwise use a remote file using a URL rather than a local file path. It is recommended to disable this option from php.ini. Your script should filter metacharacters from user input.