vendor:
WordSmith
by:
ShockShadow
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: WordSmith
Affected Version From: WordSmith 1.0 RC1
Affected Version To: WordSmith 1.0 RC1
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2007
WordSmith 1.0 RC1 (config.inc.php) Remote File Inclusion
This exploit allows an attacker to include a remote file in the config.inc.php file of WordSmith 1.0 RC1. By providing a specially crafted URL with the '_path' parameter pointing to a malicious file, the attacker can execute arbitrary code on the vulnerable server.
Mitigation:
To mitigate this vulnerability, it is recommended to update to a newer version of WordSmith that has patched this issue. Additionally, restricting access to the config.inc.php file and implementing input validation can help prevent remote file inclusion attacks.