vendor:
Kontakt Formular
by:
bd0rk
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Kontakt Formular
Affected Version From: Not specified
Affected Version To: Not specified
Patch Exists: NO
Related CWE: Not available
CPE: Not specified
Platforms Tested: Not specified
2007
Kontakt Formular 1.4 Remote File Inclusion Vulnerability
The vulnerability allows an attacker to include arbitrary files from a remote server by exploiting the 'root_path' parameter in the 'function.php' file. By manipulating the 'root_path' parameter, an attacker can execute malicious code on the target server.
Mitigation:
The vendor should release a patch to sanitize user input and prevent remote file inclusion attacks. In the meantime, users should avoid using the vulnerable version of the software or implement a web application firewall (WAF) to filter out malicious input.