vendor:
K_fileManager
by:
SHiKaA
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: K_fileManager
Affected Version From: 1.2
Affected Version To: 1.2
Patch Exists: NO
Related CWE: N/A
CPE: a:knusperleicht:k_filemanager
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
K_fileManager v1.2 <= (dwl_include_path) Remote File Inclusion Exploit
K_fileManager v1.2 is vulnerable to a Remote File Inclusion vulnerability due to a lack of sanitization of user-supplied input in the 'dwl_include_path' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a malicious URL in the 'dwl_include_path' parameter, which will be included in the application. This can allow an attacker to execute arbitrary code on the vulnerable system.
Mitigation:
Input validation should be used to ensure that user-supplied input is properly sanitized before being used in the application. Additionally, the application should be configured to only allow the inclusion of files from trusted sources.