vendor:
FileNice file browser
by:
e.wiZz!
8.8
CVSS
HIGH
Remote File Inclusion (RFI) & Local File Inclusion (LFI)
98
CWE
Product Name: FileNice file browser
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
FileNice file browser RFI&LFI
FileNice file browser is vulnerable to RFI and LFI attacks. The index.php file contains a security check for directory traversal, however, there is no check for RFI. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. This URL can contain a remote shell or a local file inclusion payload which can be used to gain access to the system.
Mitigation:
Input validation should be used to prevent RFI and LFI attacks. All user-supplied input should be validated and filtered before being used in the application. Additionally, the application should be configured to only allow access to files and directories that are necessary for the application to function.