vendor:
Fast Click
by:
R@1D3N (amin emami)
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Fast Click
Affected Version From: 2.3.8
Affected Version To: 2.3.8
Patch Exists: Unknown
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
Unknown
Fast Click <= 2.3.8 Remote File Inclusion exploit
Fast Click <= 2.3.8 is vulnerable to a Remote File Inclusion vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, and execute arbitrary code on the vulnerable system. This exploit was discovered and coded by R@1D3N (amin emami). The exploit requires the attacker to know the full path to the Fastclick application, the path to the command shell, and the command variable used in the PHP shell.
Mitigation:
To mitigate this vulnerability, the application should be configured to only allow the inclusion of files from a limited set of directories. Additionally, the application should be configured to only allow the inclusion of files with specific extensions.