vendor:
TxtBlogCMS
by:
CWH Underground
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: TxtBlogCMS
Affected Version From: v.1.0 Alpha
Affected Version To: v.1.0 Alpha
Patch Exists: Yes
Related CWE: N/A
CPE: a:txtblogcms:txtblogcms:1.0a
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
TxtBlog (index.php m) Local File Inclusion Vulnerability
A vulnerability exists in TxtBlog v.1.0 Alpha, which allows an attacker to include arbitrary files from the local system. This is due to a lack of proper sanitization of user-supplied input to the 'y' and 'm' parameters in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences (e.g. '../') to the vulnerable script. This will allow the attacker to include arbitrary files from the local system.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of TxtBlog.