vendor:
BNCwi
by:
dun
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: BNCwi
Affected Version From: 01.04
Affected Version To: 01.04
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
BNCwi <= 1.04 Local File Inclusion Vulnerability
BNCwi is a Open-Source webinterface for psyBNC. With it you easily can manage your Bouncer via a graphical interface. A vulnerability exists in the index.php file of the BNCwi script, which allows an attacker to include arbitrary local files on the server. This is due to a lack of input validation on the 'newlanguage' parameter, which is passed to the 'include()' function. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request with a malicious 'newlanguage' parameter.
Mitigation:
Input validation should be performed on all user-supplied data to prevent malicious input from being passed to the 'include()' function.