vendor:
FubarForum v1.5
by:
cOndemned
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: FubarForum v1.5
Affected Version From: 1.5
Affected Version To: 1.5
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
FubarForum v1.5 Local File Inclusion Vulnerability
FubarForum v1.5 is vulnerable to a local file inclusion vulnerability. This vulnerability is due to the application not properly sanitizing user-supplied input to the 'page' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request containing directory traversal characters to the vulnerable script. This can allow the attacker to include arbitrary local files from the web server, such as the web server's 'etc/passwd' file, resulting in the disclosure of sensitive information.
Mitigation:
Input validation should be used to ensure that user-supplied input is properly sanitized. Additionally, web server access control lists should be used to restrict access to sensitive files.