vendor:
Lotus Core CMS
by:
Daniel Monzón (stark0de)
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: Lotus Core CMS
Affected Version From: 1.0.1
Affected Version To: 1.0.1
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Windows 7 x86
2020
Lotus Core CMS 1.0.1 – Local File Inclusion
The vulnerability occurs on line 65 of the index.php file. If the page_slug parameter is not set by the user, it is set to 'index'. However, if the user sets the parameter via a GET or POST request, it checks if the file exists and performs an unsanitized inclusion. The PHP file appends '.php' to anything provided as the page_slug parameter, allowing for file inclusion. Authentication is required to exploit this vulnerability.
Mitigation:
Implement input validation and sanitization to prevent path traversal attacks. Use safe file inclusion methods such as whitelisting allowed files or using absolute paths.