vendor:
Booby
by:
mailbox1333@gmail.com
8.8
CVSS
HIGH
Local File Include / Remote File Include
98
CWE
Product Name: Booby
Affected Version From: 1.0.1
Affected Version To: 1.0.1
Patch Exists: NO
Related CWE: N/A
CPE: a:booby:booby:1.0.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Multiple Remote Vulnerabilities in Booby 1.0.1
Booby 1.0.1 is vulnerable to Local File Include (LFI) and Remote File Include (RFI) attacks. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The vulnerable parameter is ‘renderer’ in the ‘template.tpl.php’ file. An attacker can use this vulnerability to read sensitive files from the server or execute malicious code on the server.
Mitigation:
The application should filter user input and validate the input before using it in the application. The application should also use a whitelist of allowed characters and reject any input that contains characters not in the whitelist.