vendor:
Nuked-Klan 1.7.7
by:
indoushka
9.3
CVSS
HIGH
Remote File Inclusion (RFI)
98
CWE
Product Name: Nuked-Klan 1.7.7
Affected Version From: Nuked-Klan 1.7.7
Affected Version To: Nuked-Klan 1.7.7
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)
2002
Nuked-Klan 1.7.7 RFI Vulnerability
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'module' parameter of '/modules/Suggest/index.php', the 'modul' parameter of '/Includes/blocks/block_module.php' and the 'blok[type]' parameter of '/nuked.php' scripts. A remote attacker can execute arbitrary PHP code on the vulnerable system by sending a specially crafted request.
Mitigation:
Input validation should be used to prevent the exploitation of this vulnerability. It is also recommended to restrict access to the vulnerable scripts.