vendor:
phpunity.postcard
by:
Rivertam
9.3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: phpunity.postcard
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
phpunity.postcard (phpunity-postcard.php) Remote File Inclusion Exploit
phpunity.postcard is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. This can result in remote code execution.
Mitigation:
Input validation should be used to prevent malicious input from being passed to the application. Additionally, the application should be configured to only allow access to files that are necessary for the application to function.