vendor:
fuzzylime
by:
Ams
7.5
CVSS
HIGH
File Loading and Unfiltered extract() Usage
Not provided
CWE
Product Name: fuzzylime
Affected Version From: fuzzylime 3.0.1
Affected Version To: fuzzylime 3.0.1
Patch Exists: NO
Related CWE: Not provided
CPE: Not provided
Platforms Tested:
Not provided
fuzzylime 3.0.1 Perl exploit
This exploit allows the creation of a shell in /code/counter/middle_index_inc.php through the fuzzylime 3.0.1 script rss.php. The script has the ability to load files and uses unfiltered extract() function.
Mitigation:
Disable magic_quotes_gpc or apply a patch to fix the vulnerability