vendor:
JShop Server
by:
v0l4arrra
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: JShop Server
Affected Version From: 1.x
Affected Version To: 2.x
Patch Exists: NO
Related CWE: N/A
CPE: a:jshop:jshop_server
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2009
JShop 1.x-2.x local file include
JShop Server 1.x-2.x is vulnerable to Local File Inclusion. An attacker can exploit this vulnerability by sending a crafted HTTP request containing directory traversal characters to the vulnerable server. This can allow the attacker to read sensitive files on the server, such as /etc/passwd. An attacker can also upload a malicious file, such as a GIF file containing PHP code, to the vulnerable server. This can allow the attacker to execute arbitrary code on the server. A Perl script can be used to parse the output of the error log and print the results.
Mitigation:
The best way to mitigate this vulnerability is to ensure that user input is properly sanitized and validated. Input validation should be performed on both the client-side and server-side. Additionally, the web server should be configured to deny access to sensitive files and directories.