vendor:
SweetRice
by:
Ashiyane Digital Security Team
8,8
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: SweetRice
Affected Version From: 1.5.1
Affected Version To: 1.5.1
Patch Exists: NO
Related CWE: N/A
CPE: a:basic-cms:sweetrice:1.5.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: WebApp - PHP - Mysql
2016
SweetRice 1.5.1 – Local File Inclusion
SweetRice 1.5.1 is vulnerable to Local File Inclusion (LFI) vulnerability. An attacker can exploit this vulnerability to gain access to sensitive files on the server. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'file' parameter in the '_get_file' action of the 'plugin' parameter in the 'as' module. An attacker can send a specially crafted HTTP request containing directory traversal sequences (e.g. '../') to download arbitrary files from the server.
Mitigation:
To mitigate this vulnerability, the application should validate user-supplied input and sanitize it before using it in the application.