header-logo
Suggest Exploit
vendor:
Jeebles Directory
by:
5.5
CVSS
MEDIUM
Local File Inclusion
22
CWE
Product Name: Jeebles Directory
Affected Version From: 2.9.60
Affected Version To: 2.9.60
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Local File Inclusion Vulnerability in Jeebles Directory

Jeebles Directory is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. Exploiting this issue may allow an unauthorized user to execute local scripts or to view arbitrary files that may contain sensitive information that can aid in further attacks.

Mitigation:

It is recommended to sanitize user-supplied input to prevent file inclusion vulnerabilities. Additionally, restrict access to sensitive files and directories to authorized users only.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/26171/info

Jeebles Directory is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.

Exploiting this issue may allow an unauthorized user to execute local scripts or to view arbitrary files that may contain sensitive information that can aid in further attacks.

This issue affects Jeebles Directory 2.9.60; other versions may also be affected. 


http://www.example.com/[path]/download.php?settings2.inc.php