vendor:
Kemana Directory
by:
Gjoko 'LiquidWorm' Krstic
7,5
CVSS
HIGH
Local File Inclusion Vulnerability
22
CWE
Product Name: Kemana Directory
Affected Version From: 1.5.6
Affected Version To: 1.5.6
Patch Exists: YES
Related CWE: N/A
CPE: a:c97net:kemana:1.5.6
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Apache/2.4.7 (Win32), PHP/5.5.6, MySQL 5.6.14
2014
Kemana Directory 1.5.6 (run param) Local File Inclusion Vulnerability
Kemana suffers from an authenticated file inclusion vulnerability (LFI) when input passed thru the 'run' parameter to task.php is not properly verified before being used to include files. This can be exploited to include files from local resources with directory traversal attacks.
Mitigation:
Input validation should be used to prevent directory traversal attacks.