vendor:
phPay
by:
beford
7,5
CVSS
HIGH
mail() Injection
94
CWE
Product Name: phPay
Affected Version From: 2.02
Affected Version To: 2.02
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
phPay v2.02 nu_mail.inc.php mail() Injection
The phPay v2.02 nu_mail.inc.php file is vulnerable to mail() injection. The vulnerability is due to the lack of proper input validation and the lack of die()/exit() functions. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable file. This will allow the attacker to inject arbitrary code into the mail() function.
Mitigation:
Input validation should be performed to ensure that user-supplied data is properly sanitized. Additionally, die()/exit() functions should be used to prevent direct access to the vulnerable file.