vendor:
Nuked-Klan SP4
by:
indoushka
7.5
CVSS
HIGH
Remote File Inclusion (RFI)
94
CWE
Product Name: Nuked-Klan SP4
Affected Version From: Nuked-Klan SP4
Affected Version To: Nuked-Klan SP4
Patch Exists: NO
Related CWE:
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows SP2, Lunix 9.4 Ubuntu
2009
Nuked-Klan SP4 RFI Vulnerability
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'mod', 'module' and 'modul' parameters of the 'index.php', 'block_module.php' and 'Suggest/index.php' scripts. A remote attacker can send a specially crafted request to the vulnerable scripts and execute arbitrary PHP code on the vulnerable system with the privileges of the web server process.
Mitigation:
Input validation should be used to prevent the exploitation of this vulnerability. It is also recommended to restrict access to the vulnerable scripts.