vendor:
phpAbook
by:
JosS
7.5
CVSS
HIGH
Local File Inclusion
CWE
Product Name: phpAbook
Affected Version From: 0.8.8b
Affected Version To: 0.8.8b
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2008
phpAbook <= 0.8.8b (COOKIE) Local File Inclusion Vulnerability
This exploit targets the phpAbook version 0.8.8b and takes advantage of a local file inclusion vulnerability. By manipulating the 'userInfo' cookie, an attacker can include arbitrary files on the server, potentially accessing sensitive information. The exploit code is provided as a JavaScript snippet that sets the 'userInfo' cookie to include the path to the '/etc/passwd' file.
Mitigation:
To mitigate this vulnerability, it is recommended to update phpAbook to a version that includes a patch for this issue. Additionally, ensuring that the 'magic_quotes_gpc' setting is set to 'On' can provide some level of protection against this type of attack.