vendor:
FOG Forum
by:
CWH Underground
7.5
CVSS
HIGH
Local File Inclusion
94
CWE
Product Name: FOG Forum
Affected Version From: 2000.8.1
Affected Version To: 2000.8.1
Patch Exists: NO
Related CWE: N/A
CPE: a:fog_project:fog_forum
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Web
2008
FOG Forum 0.8.1 Local File Inclusion Vulnerabilities
FOG Forum 0.8.1 is vulnerable to Local File Inclusion (LFI) attacks. An attacker can exploit this vulnerability by sending maliciously crafted POST requests to the vulnerable application. The attacker can use a web proxy such as WebScarab to intercept and edit the POST request data. The vulnerable files/paths are http://[Target]/[Path]/index.php. The attacker can send maliciously crafted POST requests with the parameters fog_skin, fog_lang, fog_pseudo, fog_password, fog_cook, fog_action, fog_userid, fog_path, fog_posted, fog_pseudo, fog_password, and fog_cook. This will allow the attacker to read local files such as boot.ini.
Mitigation:
To mitigate this vulnerability, the application should be configured to only accept requests from trusted sources. Additionally, the application should be configured to only accept requests with valid parameters.