vendor:
Simple Page Option (mod_spo)
by:
SeguridadBlanca.Blogspot.com
7.5
CVSS
HIGH
Local File Inclusion (LFI)
22
CWE
Product Name: Simple Page Option (mod_spo)
Affected Version From: 1.5.x
Affected Version To: 1.5.x
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Backtrack and Windows 7
2011
Simple Page Option LFI
A vulnerability exists in Simple Page Option (mod_spo) 1.5.x, which allows an attacker to include arbitrary files from the local system. This is due to the lack of proper sanitization of user-supplied input in the 'spo_site_lang' parameter of the 'email_sender.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with directory traversal sequences (e.g. '../../../../../../../../../../etc/passwd%00') to the vulnerable script.
Mitigation:
Filter user-supplied input with str_replace() or use htaccess protection to the vulnerable file.