header-logo
Suggest Exploit
vendor:
MySimpleNews
by:
SecurityFocus
7.5
CVSS
HIGH
PHP Code Injection
78
CWE
Product Name: MySimpleNews
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

MySimpleNews PHP Code Injection Vulnerability

MySimpleNews allows users to enter news articles through a web interface. It will allow PHP code to be injected into URI parameters of the 'users.php' script, which will be stored into a MySimpleNews file (news.php3). The injected code may then be executed by the attacker by requesting the 'news.php3' script.

Mitigation:

Input validation should be used to prevent the injection of malicious code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/5865/info

MySimpleNews allows users to enter news articles through a web interface. It will allow PHP code to be injected into URI parameters of the 'users.php' script, which will be stored into a MySimpleNews file (news.php3). The injected code may then be executed by the attacker by requesting the 'news.php3' script.

http://[target]/users.php?LOGIN=[PHP code]

http://[target]/users.php?DATA=[PHP code]

http://[target]/users.php?MESS=[PHP code]

PHP code injected in this manner can be executed with the following request:

http://[target]/news.php3