vendor:
fuzzylime (cms)
by:
wHITe_ShEEp
7.5
CVSS
HIGH
Local File Inclusion
CWE
Product Name: fuzzylime (cms)
Affected Version From: Version <= 3.0
Affected Version To: Version <= 3.0
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2007
fuzzylime (cms) <= 3.0 Local File Inclusion
This exploit targets the fuzzylime (cms) version 3.0 and below. It allows an attacker to include local files by manipulating the 'p' parameter in the 'getgalldata.php' script. The vulnerability can be exploited when the 'magic_quotes_gpc' setting is turned off. The exploit sends a malicious request to the target site, including the '../etc/passwd' file in the 'p' parameter value. This allows the attacker to read sensitive system files.
Mitigation:
To mitigate this vulnerability, it is recommended to update to a newer version of fuzzylime (cms) that includes a patch for this issue. Additionally, enabling 'magic_quotes_gpc' can provide some protection against this type of attack.