vendor:
Ovidentia Maillist
by:
bd0rk
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Ovidentia Maillist
Affected Version From: 4.0
Affected Version To: 4.0
Patch Exists: NO
Related CWE: N/A
CPE: a:ovidentia:ovidentia_maillist
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu-Linux
2011
Ovidentia maillist 4.0 Module Remote File Inclusion Exploit
This exploit allows an attacker to include a remote file on the web server. The vulnerability exists in the Ovidentia maillist 4.0 Module, specifically in the mlincl.php file. The attacker can use the GLOBALS[babInstallPath] parameter to inject a malicious file from a remote server. The malicious file is then executed on the web server.
Mitigation:
The best way to mitigate this vulnerability is to ensure that user input is properly sanitized and validated. Additionally, the web server should be configured to only allow access to the necessary files and directories.