header-logo
Suggest Exploit
vendor:
DZCP
by:
High-Tech Bridge SA - Ethical Hacking & Penetration Testing
7,5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: DZCP
Affected Version From: 1.5.4
Affected Version To: 1.5.4
Patch Exists: YES
Related CWE: N/A
CPE: a:dzcp.de:dzcp:1.5.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Local File Inclusion

The vulnerability exists due to failure in the "/index.php" script to properly sanitize user-supplied input in [prefix]_language variable from cookie. The following PoC is available: Cookie: [prefix]_language=../../../1; File must exist.

Mitigation:

Upgrade to the most recent version of DZCP.
Source

Exploit-DB raw data:

Vulnerability ID: HTB22656
Reference: http://www.htbridge.ch/advisory/lfi_in_dzcp.html
Product: DZCP 
Vendor: dzcp.de  ( http://www.dzcp.de ) 
Vulnerable Version: 1.5.4 
Vendor Notification: 13 October 2010 
Vulnerability Type: Local File Inclusion
Status: Fixed by Vendor
Risk level: High 
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/) 

Vulnerability Details:
The vulnerability exists due to failure in the "/index.php" script to properly sanitize user-supplied input in [prefix]_language variable from cookie.

The following PoC is available:


Cookie: [prefix]_language=../../../1;

File must exist. 
Solution: Upgrade to the most recent version