header-logo
Suggest Exploit
vendor:
PortailPHP
by:
Unknown
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: PortailPHP
Affected Version From: PortailPHP 2
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:portailphp:portailphp:2
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

PortailPHP Multiple Remote File-Include Vulnerabilities

PortailPHP is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input. A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.

Mitigation:

To mitigate these vulnerabilities, it is recommended to sanitize user-supplied input properly before using it in file inclusion functions. Update to a patched version when available.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/22381/info

PortailPHP is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.

A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.

PortailPHP 2 is vulnerable to these issues; other versions may also be affected. 

http://www.example.commod_news/index.php?chemin=../../../../../../../../../../../../../etc/passwd%00