vendor:
iBrowser
by:
Gjoko 'LiquidWorm' Krstic
7.5
CVSS
HIGH
Local File Inclusion Vulnerability
22
CWE
Product Name: iBrowser
Affected Version From: <= 1.4.1 Build 10182009
Affected Version To: <= 1.4.1 Build 10182009
Patch Exists: YES
Related CWE: N/A
CPE: net4visions.com:ibrowser:1.4.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Microsoft Windows XP Professional SP3 (EN), Apache 2.2.14 (Win32), PHP 5.3.1, MySQL 5.1.41
2011
iBrowser Plugin v1.4.1 (lang) Local File Inclusion Vulnerability
iBrowser is an image browser plugin for WYSIWYG editors like tinyMCE, SPAW, htmlAREA, Xinha and FCKeditor developed by net4visions. It allows image browsing, resizing on upload, directory management and more with the integration of the phpThumb image library. iBrowser suffers from a file inlcusion vulnerability (LFI) / file disclosure vulnerability (FD) when input passed thru the 'lang' parameter to ibrowser.php, loadmsg.php, rfiles.php and symbols.php is not properly verified before being used to include files. This can be exploited to include files from local resources with directory traversal attacks and URL encoded NULL bytes.
Mitigation:
Input validation should be performed to ensure that untrusted data is not used to access local resources.