vendor:
Jaws
by:
milw0rm.com
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: Jaws
Affected Version From: 2000.8.8
Affected Version To: 2000.8.8
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Jaws 0.8.8 Local File Inclusion
Jaws 0.8.8 is vulnerable to Local File Inclusion (LFI) when an attacker sends a specially crafted HTTP POST request to the vulnerable application. The vulnerable parameters are ‘language’ in the ‘/upgrade/index.php’ and ‘/install/index.php’ scripts. An attacker can exploit this vulnerability by sending a malicious HTTP POST request with the ‘language’ parameter set to a file path such as ‘../../../../../../../../../../../../etc/passwd%00’. This will cause the application to include the contents of the ‘/etc/passwd’ file in the response. Additionally, the ‘Introduction_complete’ and ‘use_log’ scripts are also vulnerable to this attack.
Mitigation:
The best way to mitigate this vulnerability is to ensure that user input is properly sanitized and validated before being used in any file operations.