vendor:
phpGreetz
by:
mozi2weed@yahoo.com mozi
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: phpGreetz
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
phpGreetz Remote File Inclusion Vulnerability
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'PHPGREETZ_INCLUDE_DIR' parameter to the 'footer.php' script. This can be exploited to include arbitrary files from remote hosts and execute arbitrary PHP code.
Mitigation:
Input validation should be used to ensure that user-supplied input is properly sanitized.